The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for CRYPTON with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1999-2014 (16) 2015-2018 (6)
Publication types (Num. hits)
article(10) inproceedings(12)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1 occurrences of 1 keywords

Results
Found 22 publication records. Showing 22 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
157Jongsung Kim, Seokhie Hong, Sangjin Lee 0002, Jung Hwan Song, Hyungjin Yang Truncated Differential Attacks on 8-Round CRYPTON. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Truncated Differential Attack, CRYPTON, Block Cipher
121Marine Minier, Henri Gilbert Stochastic Cryptanalysis of Crypton. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
107Chae Hoon Lim A Revised Version of Crypton - Crypton V1.0. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
99Carl D'Halluin, Gert Bijnens, Vincent Rijmen, Bart Preneel Attack on Six Rounds of Crypton. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
99Eunjong Hong, Jai-Hoon Chung, Chae Hoon Lim Hardware Design and Performance Estimation of the 128-bit Block Cipher Crypton. Search on Bibsonomy CHES The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
62Yuechuan Wei, Chao Li 0002, Bing Sun 0001 Related-key impossible differential cryptanalysis on Crypton and Crypton v1.0. Search on Bibsonomy WorldCIS The full citation details ... 2011 DBLP  BibTeX  RDF
53Jung Hee Cheon, MunJu Kim, Kwangjo Kim, Jung-Yeun Lee, SungWoo Kang Improved Impossible Differential Cryptanalysis of Rijndael and Crypton. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
31Dong Yang, Wen-Feng Qi 0001, Hua-Jin Chen Observations on the truncated differential of SP block ciphers and their applications to mCrypton and CRYPTON V1.0. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Rongjia Li, Chenhui Jin Improved meet-in-the-middle attacks on Crypton and mCrypton. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
31Jingyi Cui, Jiansheng Guo, Yanyan Huang, Yipeng Liu Improved Meet-in-the-Middle Attacks on Crypton and mCrypton. Search on Bibsonomy KSII Trans. Internet Inf. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
31Yonglin Hao Improved Meet-in-the-Middle Attacks on Round-Reduced Crypton-256. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
31Mohsen Shakiba, Mohammad Dakhilalian, Hamid Mala Non-isomorphic biclique cryptanalysis of full-round Crypton. Search on Bibsonomy Comput. Stand. Interfaces The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
31Yongguang Li, Guang Zeng, Wenbao Han 缩减轮数Crypton算法中间相遇攻击的改进 (Improved Meet-in-the-middle Attack on Reduced-round Crypton Cipher). Search on Bibsonomy 计算机科学 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
31Junghwan Song, Kwanhyung Lee, HwanJin Lee Biclique Cryptanalysis on the Full Crypton-256 and mCrypton-128. Search on Bibsonomy J. Appl. Math. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Xiaoying Wang, Danqi Chen 0002, Qingjie Liu, Ling Bai An Improvement Crypton Protocol with Higher Security Margin. Search on Bibsonomy J. Networks The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Jinkeon Kang, Kitae Jeong, Jaechul Sung, Seokhie Hong, Kyungho Lee Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis. Search on Bibsonomy J. Appl. Math. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
31Hamid Mala, Mohsen Shakiba, Mohammad Dakhilalian New impossible differential attacks on reduced-round Crypton. Search on Bibsonomy Comput. Stand. Interfaces The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
31Haruki Seki, Toshinobu Kaneko Cryptanalysis of Five Rounds of CRYPTON Using Impossible Differentials. Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
23Chae Hoon Lim, Tymur Korkishko mCrypton - A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors. Search on Bibsonomy WISA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Routo Terada, Paulo G. Pinheiro Quadratic Relations for S-Boxes: Their Minimum Representations and Bounds. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
23Kazumaro Aoki Efficient Evaluation of Security against Generalized Interpolation Attack. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
23R. Reed Taylor, Seth Copen Goldstein A High-Performance Flexible Architecture for Cryptography. Search on Bibsonomy CHES The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #22 of 22 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license