Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
26
views
26
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,085
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Applied Cryptography and Network Security : 20th International Conference, ACNS 2022, Rome, Italy, June 20–23, 2022, Proceedings
Improved Differential-Linear Attack with Application to Round-Reduced Speck32/64
other
Author(s):
Feifan Wang
,
Gaoli Wang
Publication date
(Online):
June 18 2022
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
SDG 10: Reduced Inequalities
Most cited references
26
Record
: found
Abstract
: not found
Book
: not found
The Design of Rijndael
Joan Daemen
,
Vincent Rijmen
(2002)
0
comments
Cited
196
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Linear Cryptanalysis Method for DES Cipher
Mitsuru Matsui
(1994)
0
comments
Cited
113
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Differential Cryptanalysis of DES-like Cryptosystems
Eli Biham
,
Adi Shamir
(1991)
0
comments
Cited
58
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2022
Publication date (Online):
June 18 2022
Pages
: 792-808
DOI:
10.1007/978-3-031-09234-3_39
SO-VID:
d307c018-d079-4cf7-861e-3cc7bbdad56c
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Keyed-Fully Homomorphic Encryption Without Indistinguishability Obfuscation
pp. 24
A Performance Evaluation of Pairing-Based Broadcast Encryption Systems
pp. 45
An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile
pp. 67
Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle
pp. 85
Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort Deauthentication
pp. 105
ZLeaks: Passive Inference Attacks on Zigbee Based Smart Homes
pp. 126
Passive Query-Recovery Attack Against Secure Conjunctive Keyword Search Schemes
pp. 147
Gummy Browsers: Targeted Browser Spoofing Against State-of-the-Art Fingerprinting Techniques
pp. 170
Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge
pp. 193
RSA Key Recovery from Digit Equivalence Information
pp. 212
Practical Seed-Recovery of Fast Cryptographic Pseudo-Random Number Generators
pp. 230
Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges
pp. 253
KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip
pp. 273
Improving the Privacy of Tor Onion Services
pp. 293
Privacy-Preserving Authenticated Key Exchange for Constrained Devices
pp. 313
Relations Between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting Protocols
pp. 337
An Approach to Generate Realistic HTTP Parameters for Application Layer Deception
pp. 356
IPSpex: Enabling Efficient Fuzzing via Specification Extraction on ICS Protocol
pp. 376
Probing for Passwords – Privacy Implications of SSIDs in Probe Requests
pp. 399
A Cryptographic View of Deep-Attestation, or How to Do Provably-Secure Layer-Linking
pp. 419
Don’t Tamper with Dual System Encryption
pp. 440
Progressive and Efficient Verification for Digital Signatures
pp. 459
Revocable Hierarchical Attribute-Based Signatures from Lattices
pp. 480
Covert Authentication from Lattices
pp. 501
Spreading the Privacy Blanket:
pp. 521
Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret Encapsulation
pp. 542
(Commit-and-Prove) Predictable Arguments with Privacy
pp. 565
Communication-Efficient Proactive MPC for Dynamic Groups with Dishonest Majorities
pp. 585
PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions
pp. 605
Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFA
pp. 626
Efficient and Tight Oblivious Transfer from PKE with Tight Multi-user Security
pp. 643
Efficient Two-Party Exponentiation from Quotient Transfer
pp. 663
Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC
pp. 684
How Byzantine is a Send Corruption?
pp. 707
Babel Fees via Limited Liabilities
pp. 727
FAST: Fair Auctions via Secret Transactions
pp. 748
Astrape: Anonymous Payment Channels with Boring Cryptography
pp. 771
A White-Box Speck Implementation Using Self-equivalence Encodings
pp. 792
Improved Differential-Linear Attack with Application to Round-Reduced Speck32/64
pp. 809
Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck Distinguisher
pp. 833
Carry-Less to BIKE Faster
pp. 853
Faster Kyber and Dilithium on the Cortex-M4
pp. 872
Quantum-Resistant Software Update Security on Low-Power Networked Embedded Devices
pp. 892
Post-quantum ID-Based Ring Signatures from Symmetric-Key Primitives
Similar content
2,085
Resolución 2465 14 de junio de 2016, Ministerio de Salud y Protección social. Por la cual se adoptan los indicadores antropométricos, patrones de referencia y puntos de corte para la clasificación antropométrica del estado nutricional de niñas, niños y adolescentes menores de 18 años de edad, adultos de 18 a 64 años de edad y gestantes adultas y se dictan otras disposiciones. (Diario oficial, Bogotá, D. C., 2016.)
Authors:
4:03 PM Abstract No. 279 Additional drug-eluting beads transcatheter arterial embolization (dTACE) as salvage therapy in advanced hepatocellular carcinoma with portal vein thrombosis refractory to conventional TACE (cTACE): an initial study of 64 patients
Authors:
J. Li
,
W Fan
Un análisis cuantificado de los efectos de la reforma laboral sobre el 64 empleo
Authors:
J. Lago Peñas
,
J. Penas
See all similar