Security and performance analysis of ARIA (original) (raw)
Related papers
Improved Linear Cryptanalysis of Round-Reduced ARIA
Lecture Notes in Computer Science, 2016
Lecture Notes in Computer Science, 2003
A Tutorial on Linear and Differential Cryptanalysis
LOTUS and LOCUS AEAD: Hardware Benchmarking and Security Analysis
2019
µ 2 : A Lightweight Block Cipher
Lecture Notes in Electrical Engineering, 2020
Cryptanalysis of block ciphers: A survey
2003
Linear and Differential Cryptanalysis of Substitution Permutation Networks
Security Analysis Between Static and Dynamic S-Boxes in Block Ciphers
Journal of Information System and Technology Management, 2021
CHAPTER 2 LITRETURE REVIEW THE AES CIPHER
ULBC: An Ultra Light-weight Block Cipher
Journal of Advances in Mathematics and Computer Science
Block Ciphers – Focus On The Linear Layer (feat. PRIDE
Design for Security of Block Cipher S-Boxes to Resist Differential Power Attacks
2012
Linear Cryptanalysis of S-Box BRADG
International Journal of Engineering & Technology, 2018
A Review on Evolution of Symmetric Key Block Ciphers and Their Applications
IETE Journal of Education, 2020
Twofish: A 128Bit Block Cipher
1998
The 256/384/512-bit version of the Rijndael block cipher
Journal of Computer Science and Cybernetics, 2012
Studies on Cryptographic Security and Speed Analysis of New Advanced Block Cipher
2020
Differential and linear cryptanalysis for 2-round SPNs
Information Processing Letters, 2003
Differential cryptanalysis of substitution permutation networks and Rijndael-like ciphers
2006
AES -- The State of the Art of Rijndael’s Security
2002
Security Evaluation of the K 2 Stream Cipher Editors
2011
Chapter 7 The Advanced Encryption Standard (AES)
Block Ciphers-Focus On The Linear Layer (feat. PRIDE): Full Version
Performance Analysis of Advanced Encryption Standard (AES) S-boxes
International Journal of Recent Technology and Engineering (IJRTE), 2020
Serpent: A New Block Cipher Proposal
Lecture Notes in Computer Science, 1998
Randomness Evaluation and Hardware Implementation of Nonadditive CA-Based Stream Cipher
Arxiv preprint nlin/0412028, 2004
Vulnerability Analysis of Authenticated Encryption
Algebraic, aida/cube and side channel analysis of katan family of block ciphers
2010
Analysis and Design of Symmetric Cryptographic Algorithms
2007