FOX: a New Family of Block Ciphers (2004)

by Pascal Junod
Venue:Selected Areas in Cryptography-SAC 2004,LNCS 2595
Citations:17 - 3 self

Active Bibliography

4 Statistical Cryptanalysis of Block Ciphers – Pascal Junod - 2004
45 Survey and Benchmark of Block Ciphers for Wireless Sensor Networks – Yee Wei Law, Jeroen Doumen, Pieter Hartel - 2004
9 Block Ciphers and Stream Ciphers: The State of the Art, Cryptology ePrint Archive, 2004, Report 2004/094. Available at http://eprint.iacr.org/2004/094 – Alex Biryukov
3D: A Three-Dimensional Block Cipher – Jorge Nakahara, École Polytechnique Fédéraledelausanne
2 Distinguishing Attacks on a Kind of Generalized Unbalanced Feistel Network – Ruilin Li, Bing Sun, Chao Li
1 Techniques for Cryptanalysis of Block Ciphers – Orr Dunkelman
1 New Methodologies for Differential-Linear Cryptanalysis and Its Extensions – Jiqiang Lu
Cryptanalysis of Symmetric Block Ciphers – Kungl Tekniska Högskolan, Computer Science, Gustaf Dellkrantz, Supervisor K. U, Leuven Christophe, De Cannière, Breaking Reduced Khazad
4 MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants – John Kelsey, Bruce Schneier
The Twofish Team's Final Comments on AES Selection – Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson, Tadayoshi Kohno, Mike Stay - 2000
Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher ⋆ – Jiqiang Lu, Yongzhuang Wei, Enes Pasalic, Pierre-alain Fouque
11 Related-Key Rectangle Attacks on Reduced AES192 and AES-256 – Jongsung Kim, Seokhie Hong, Bart Preneel - 2007
5 Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard – Jiqiang Lu - 2007
3 Related-key rectangle attack on 42-round SHACAL-2 – Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman - 2006
12 SEA: A Scalable Encryption Algorithm for Small Embedded Applications – François-Xavier Standaert, Gilles Piret, Neil Gershenfeld, Jean-Jacques Quisquater - 2006
3 Security evaluation of GOST 28147-89 in view of international standardization”, Cryptology ePrint Archive – Nicolas T. Courtois
7 Algebraic complexity reduction and cryptanalysis of gost (2011) http://www – Nicolas T. Courtois
Differential Cryptanalysis of GOST – Nicolas T. Courtois
34 Algebraic and Slide Attacks on KeeLoq – Nicolas T. Courtois, Gregory V. Bard, David Wagner