-
21
Further accelerating the search of differential characteristics based on the SAT method
Published 2022-10-01Subjects: “…differential cryptanalysis…”
Get full text
Article -
22
Security evaluation against differential cryptanalysis for dynamic cryptographic structure
Published 2021-08-01Subjects: Get full text
Article -
23
Quantum cryptanalysis of lightweight block cipher Piccolo
Published 2023-06-01Subjects: “…quantum cryptanalysis…”
Get full text
Article -
24
-
25
Improved integral cryptanalysis of SPNbox in digital rights management systems
Published 2023-01-01Subjects: Get full text
Article -
26
Differential fault analysis on the SMS4 cipher by inducing faults to the key schedule
Published 2008-01-01Subjects: “…cryptanalysis…”
Get full text
Article -
27
Statistical ineffective fault analysis of the lightweight authenticated cipher algorithm Saturnin-Short
Published 2023-04-01Subjects: Get full text
Article -
28
New certificateless aggregate signature scheme with universal designated verifier
Published 2017-11-01Subjects: “…cryptanalysis…”
Get full text
Article -
29
Cryptanalysis of IAR-CTR and IAR-CFB and a fixing method
Published 2025-01-01Subjects: Get full text
Article -
30
Improvement and evaluation for algebraic fault attacks on PRESENT
Published 2016-08-01Subjects: “…algebraic cryptanalysis…”
Get full text
Article -
31
Guess and determine attack on E<sub>0</sub>algorithm
Published 2012-11-01Subjects: “…cryptanalysis…”
Get full text
Article -
32
Cryptanalysis of Novel Image Encryption Scheme Based on Multiple Chaotic Substitution Boxes
Published 2021-01-01Subjects: “…Cryptanalysis…”
Get full text
Article -
33
A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
Published 2025-01-01Subjects: Get full text
Article -
34
Impossible differential cryptanalysis of reduced-round <inline-formula><alternatives><math xmlns:mml="http://www.w3.org/1998/Math/MathML" id="M2"><msup><mrow><mi mathvariant="bold-...
Published 2024-11-01Subjects: “…impossible differential cryptanalysis…”
Get full text
Article