Open problems of proving security of ARX-based ciphers to differential cryptanalysis
暂无分享,去创建一个
[1] Olexandr Kuznetsov,et al. Strumok stream cipher: Specification and basic properties , 2016, 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T).
[2] A. A. Kuznetsov,et al. Methods of synthesis of signals with prescribed properties , 2007 .
[3] V. A. Krasnobayev,et al. A Method for Increasing the Reliability of Verification of Data Represented in a Residue Number System , 2014 .
[4] I. D. Gorbenko,et al. ENSEMBLE AND CORRELATION PROPERTIES OF CRYPTOGRAPHIC SIGNALS FOR TELECOMMUNICATION SYSTEM AND NETWORK APPLICATIONS , 2016 .
[5] V. M. Grachev,et al. Data security mechanisms implemented in the database with universal model , 2014 .
[6] V. M. Grachev,et al. Technology for developing databases of information systems , 2014 .
[7] Sergii Kavun,et al. Techniques for Performance Improvement of Integer Multiplication in Cryptographic Applications , 2014 .
[8] Nicky Mouha,et al. The Design Space of Lightweight Cryptography , 2015, IACR Cryptol. ePrint Arch..
[9] Alina Andrushkevych,et al. The block symmetric ciphers in the post-quantum period , 2016, 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T).
[10] Bart Preneel,et al. A Proof that the ARX Cipher Salsa20 is Secure against Differential Cryptanalysis , 2013, IACR Cryptol. ePrint Arch..
[11] Jason Smith,et al. The SIMON and SPECK lightweight block ciphers , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[12] Tamila Lavrovska,et al. Physical model of pseudorandom codes in multidimensional Euclidean space , 2016, 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T).
[13] Alex Biryukov,et al. Automatic Search for Differential Trails in ARX Ciphers , 2014, CT-RSA.
[14] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[15] Shahram Khazaei,et al. New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba , 2008, FSE.
[16] A. V. Potii,et al. A System Approach to Certification of Pseudorandom Numbers Generators Used in Information Protection Systems , 1998 .
[17] A. A. Kuznetsov,et al. THE STATISTICAL ANALYSIS OF A NETWORK TRAFFIC FOR THE INTRUSION DETECTION AND PREVENTION SYSTEMS , 2015 .
[18] Ivan Gorbenko,et al. Examining a possibility to use and the benefits of post-quantum algorithms dependent on the conditions of their application , 2017 .
[19] Olexandr Kuznetsov,et al. Combinatorial properties of block symmetric ciphers key schedule , 2016, 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T).
[20] Bart Preneel,et al. The Differential Analysis of S-Functions , 2010, Selected Areas in Cryptography.
[21] I. Gorbenko,et al. Methods of Information Protection in Communications Systems and Methods of Their Cryptoanalysis , 1998 .