Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
102 | Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater |
Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
multiple linear cryptanalysis, Advanced Encryption Standard, branch-and-bound, linear cryptanalysis, linear approximations, Serpent |
94 | Nicolas T. Courtois, Josef Pieprzyk |
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
MQ problem, overdefined systems of multivariate equations, Gröbner bases, sparse multivariate polynomials, Multivariate Cryptanalysis, Block ciphers, AES, Rijndael, Square, Camellia, Serpent, XL algorithm, multivariate quadratic equations |
93 | Orr Dunkelman, Sebastiaan Indesteege, Nathan Keller |
A Differential-Linear Attack on 12-Round Serpent. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
93 | Jesús Lázaro 0001, Armando Astarloa, Jagoba Arias, Unai Bidarte, Carlos Cuadrado |
High Throughput Serpent Encryption Implementation. |
FPL |
2004 |
DBLP DOI BibTeX RDF |
|
93 | Eli Biham, Orr Dunkelman, Nathan Keller |
Differential-Linear Cryptanalysis of Serpent. |
FSE |
2003 |
DBLP DOI BibTeX RDF |
|
93 | Eli Biham, Orr Dunkelman, Nathan Keller |
Linear Cryptanalysis of Reduced Round Serpent. |
FSE |
2001 |
DBLP DOI BibTeX RDF |
|
85 | Joo Yeon Cho, Miia Hermelin, Kaisa Nyberg |
A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent. |
ICISC |
2008 |
DBLP DOI BibTeX RDF |
Multidimensional Linear Approximation, Block Ciphers, Linear Cryptanalysis, Serpent |
76 | Adrian K. Lutz, Jürg Treichler, Frank K. Gürkaynak, Hubert Kaeslin, Gérard Basler, Antonia Erni, Stephan Reichmuth, Pieter Rommens, Stephan Oetiker, Wolfgang Fichtner |
2Gbit/s Hardware Realizations of RIJNDAEL and SERPENT: A Comparative Analysis. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
|
76 | Eli Biham, Orr Dunkelman, Nathan Keller |
The Rectangle Attack - Rectangling the Serpent. |
EUROCRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
76 | Adam J. Elbirt, Christof Paar |
An FPGA implementation and performance evaluation of the Serpent block cipher. |
FPGA |
2000 |
DBLP DOI BibTeX RDF |
algorithm-agility, FPGA, cryptography, VHDL, block cipher |
60 | Alex Biryukov, Christophe De Cannière |
Block Ciphers and Systems of Quadratic Equations. |
FSE |
2003 |
DBLP DOI BibTeX RDF |
Khazad, Misty, Block ciphers, linearization, Rijndael, Camellia, Serpent, multivariate quadratic equations |
59 | John Kelsey, Tadayoshi Kohno, Bruce Schneier |
Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent. |
FSE |
2000 |
DBLP DOI BibTeX RDF |
|
59 | Cameron Patterson |
A Dynamic FPGA Implementation of the Serpent Block Cipher. |
CHES |
2000 |
DBLP DOI BibTeX RDF |
|
43 | Muhammad Reza Z'aba, Håvard Raddum, Matthew Henricksen, Ed Dawson |
Bit-Pattern Based Integral Attack. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
integral cryptanalysis, Noekeon, Block ciphers, present, Serpent |
43 | Nicolas T. Courtois, Blandine Debraize |
Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts. |
WEWoRC |
2007 |
DBLP DOI BibTeX RDF |
algebraic attacks on block ciphers, Gröbner bases, design of S-boxes, Rijndael, algebraic immunity, Serpent, multivariate equations |
43 | Nicolas T. Courtois |
General Principles of Algebraic Attacks and New Design Criteria for Cipher Components. |
AES Conference |
2004 |
DBLP DOI BibTeX RDF |
polynomial relations, design of cryptographic primitives, generalised linear cryptanalysis, multivariate public key encryption and signature schemes, Quartz, combiners with memory, elimination methods, Gröbner bases, Boolean functions, stream ciphers, block ciphers, AES, finite fields, algebraic attacks, Rijndael, Serpent, HFE, Sflash, multivariate equations |
42 | Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater |
Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg |
Multidimensional Linear Cryptanalysis of Reduced Round Serpent. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Tetsu Iwata, Kaoru Kurosawa |
On the Pseudorandomness of the AES Finalists - RC6 and Serpent. |
FSE |
2000 |
DBLP DOI BibTeX RDF |
|
34 | Issam W. Damaj |
Parallel Algorithms Development for Programmable Devices with Application from Cryptography. |
Int. J. Parallel Program. |
2007 |
DBLP DOI BibTeX RDF |
Parallel algorithms, methodologies, formal models, data encryption, gate array |
34 | Gregor Leander, Axel Poschmann |
On the Classification of 4 Bit S-Boxes. |
WAIFI |
2007 |
DBLP DOI BibTeX RDF |
Vectorial Boolean function, Affine equivalence, Hardware Implementation, S-box |
34 | Eli Biham, Orr Dunkelman, Nathan Keller |
New Results on Boomerang and Rectangle Attacks. |
FSE |
2002 |
DBLP DOI BibTeX RDF |
|
34 | Pawel Chodowiec, Po Khuon, Kris Gaj |
Fast implementations of secret-key block ciphers using mixed inner- and outer-round pipelining. |
FPGA |
2001 |
DBLP DOI BibTeX RDF |
fast architectures, secret-key ciphers, pipelining, AES |
34 | Kris Gaj, Pawel Chodowiec |
Fast Implementation and Fair Comparison of the Final Candidates for Advanced Encryption Standard Using Field Programmable Gate Arrays. |
CT-RSA |
2001 |
DBLP DOI BibTeX RDF |
|
34 | Andreas Dandalis, Viktor K. Prasanna, José D. P. Rolim |
A Comparative Study of Performance of AES Final Candidates Using FPGAs. |
CHES |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Itai Dinur, Adi Shamir |
Generic Analysis of Small Cryptographic Leaks. |
FDTC |
2010 |
DBLP DOI BibTeX RDF |
cube attacks, robust cube attacks, cryptanalysis, AES, side channel attacks, Serpent |
25 | Mohammad Shahab Sepehri, Zalan Fabian, Mahdi Soltanolkotabi |
Serpent: Scalable and Efficient Image Restoration via Multi-scale Structured State Space Models. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
25 | Hosein Hadipour, Patrick Derbez, Maria Eichlseder |
Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
25 | Chunning Zhou, Wentao Zhang, Weiwei Cao |
A New Approach of Evaluating the Security Against Differential and Linear Cryptanalysis and Its Applications to Serpent, NOEKEON and ASCON. |
Comput. J. |
2024 |
DBLP DOI BibTeX RDF |
|
25 | Sadam Hussain, Muhammad Asif, Tariq Shah, Abid Mahboob, Sayed M. Eldin |
Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Huwaida T. I. Elshoush, Khalil T. Obeid, Mahmoud M. Mahmoud |
A Novel Approach to Improve the Performance of Serpent Algorithm using Lorenz 96 Chaos-based Block Key Generation. |
J. Inf. Hiding Multim. Signal Process. |
2022 |
DBLP BibTeX RDF |
|
25 | Huwaida T. I. Elshoush, Batool H. Abdallah, Duaa M. Ahmed, Abdalmajid A. Ishag, Sittana O. Afifi |
Expeditiousness Serpent Using CTR Mode and Logistic Map. |
J. Inf. Hiding Multim. Signal Process. |
2022 |
DBLP BibTeX RDF |
|
25 | Khumbelo Muthavhine, Mbuyu Sumbwanyambe |
Securing IoT Devices against Differential-Linear (DL) Attack Used on Serpent Algorithm. |
Future Internet |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Marek Broll, Federico Canale, Nicolas David 0001, Antonio Flórez-Gutiérrez, Gregor Leander, María Naya-Plasencia, Yosuke Todo |
New Attacks from Old Distinguishers Improved Attacks on Serpent. |
CT-RSA |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Huwaida T. I. Elshoush, Banan M. Al-Tayeb, Khalil T. Obeid |
Enhanced Serpent algorithm using Lorenz 96 Chaos-based block key generation and parallel computing for RGB image encryption. |
PeerJ Comput. Sci. |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Marek Broll, Federico Canale, Nicolas David 0001, Antonio Flórez-Gutiérrez, Gregor Leander, María Naya-Plasencia, Yosuke Todo |
Further Improving Differential-Linear Attacks: Applications to Chaskey and Serpent. |
IACR Cryptol. ePrint Arch. |
2021 |
DBLP BibTeX RDF |
|
25 | Toni Kaltiaisenaho |
Photon transport physics in Serpent 2 Monte Carlo code. |
Comput. Phys. Commun. |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Tariq Shah, Tanveer ul Haq, Ghazanfar F. Siddiqui |
Improved SERPENT Algorithm: Design to RGB Image Encryption Implementation. |
IEEE Access |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Petr Socha, Jan Brejník, Josep Balasch, Martin Novotný, Nele Mentens |
Side-channel countermeasures utilizing dynamic logic reconfiguration: Protecting AES/Rijndael and Serpent encryption in hardware. |
Microprocess. Microsystems |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Petr Socha, Jan Brejník, Stanislav Jerabek, Martin Novotný, Nele Mentens |
Dynamic Logic Reconfiguration Based Side-Channel Protection of AES and Serpent. |
DSD |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Thibault Manneville |
The serpent nest conjecture for accordion complexes. |
Eur. J. Comb. |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Mazhar Tayel, George Dawood, Hamed Shawky |
A Proposed Serpent-Elliptic Hybrid Cryptosystem For Multimedia Protection. |
ICACCI |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Frédéric Chapoton |
Stokes posets and serpent nests. |
Discret. Math. Theor. Comput. Sci. |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Goutam Paul 0001, Anupam Chattopadhyay |
Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes. |
IEEE Trans. Computers |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Cihangir Tezcan |
Differential Factors Revisited: Corrected Attacks on PRESENT and SERPENT. |
LightSec |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Cihangir Tezcan, Ferruh Özbudak |
Differential Factors: Improved Attacks on SERPENT. |
IACR Cryptol. ePrint Arch. |
2014 |
DBLP BibTeX RDF |
|
25 | Cihangir Tezcan, Halil Kemal Taskin, Murat Demircioglu |
Improbable Differential Attacks on Serpent using Undisturbed Bits. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Cihangir Tezcan, Ferruh Özbudak |
Differential Factors: Improved Attacks on SERPENT. |
LightSec |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Massimo Alioto, Simone Bongiovanni, Giuseppe Scotti, Alessandro Trifiletti |
Leakage Power Analysis attacks against a bit slice implementation of the Serpent block cipher. |
MIXDES |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Jialin Huang, Xuejia Lai |
Chosen-plaintext linear attacks on Serpent. |
IET Inf. Secur. |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Luke W. Peck, Danielle M. Fenech |
SERPent: Automated reduction and RFI-mitigation software for e-MERLIN. |
Astron. Comput. |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Goutam Paul 0001, Anupam Chattopadhyay |
Three Snakes in One Hole: A 67 Gbps Flexible Hardware for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes. |
IACR Cryptol. ePrint Arch. |
2013 |
DBLP BibTeX RDF |
|
25 | James McLaughlin 0003, John A. Clark |
Filtered nonlinear cryptanalysis of reduced-round Serpent, and the Wrong-Key Randomization Hypothesis. |
IACR Cryptol. ePrint Arch. |
2013 |
DBLP BibTeX RDF |
|
25 | James McLaughlin 0003, John A. Clark |
Nonlinear cryptanalysis of reduced-round Serpent and metaheuristic search for S-box approximations. |
IACR Cryptol. ePrint Arch. |
2013 |
DBLP BibTeX RDF |
|
25 | Jaroslaw Sugier |
Implementing Salsa20 vs. AES and Serpent Ciphers in Popular-Grade FPGA Devices. |
DepCoS-RELCOMEX |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Aditya Yulianto, Maria Irmina Prasetiyowati |
BoxLock: Mobile-based Serpent cryptographic algorithm and One-Time Password mechanism implementation for Dropbox files security. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Weiqiang Liu 0001, Saket Srivastava, Liang Lu, Máire O'Neill, Earl E. Swartzlander Jr. |
Power analysis attack of QCA circuits: A case study of the Serpent cipher. |
ISCAS |
2013 |
DBLP DOI BibTeX RDF |
|
25 | James McLaughlin 0003, John A. Clark |
Filtered Nonlinear Cryptanalysis of Reduced-Round Serpent, and the Wrong-Key Randomization Hypothesis. |
IMACC |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Deukjo Hong, Bonwook Koo, Dong-Chan Kim |
Preimage and Second-Preimage Attacks on PGV Hashing Modes of Round-Reduced ARIA, Camellia, and Serpent. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Meiqin Wang, Yue Sun, Elmar Tischhauser, Bart Preneel |
A Model for Structure Attacks, with Applications to PRESENT and Serpent. |
FSE |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Christophe De Cannière |
SERPENT. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Meiqin Wang, Xiaoyun Wang 0001, Lucas Chi Kwong Hui |
Differential-algebraic cryptanalysis of reduced-round of Serpent-256. |
Sci. China Inf. Sci. |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Gaoli Wang, Shaohui Wang |
Improved Differential Cryptanalysis of Serpent. |
CIS |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Kevin J. Compton, Brian Timm, Joel VanLaven |
A Simple Power Analysis Attack on the Serpent Key Schedule. |
IACR Cryptol. ePrint Arch. |
2009 |
DBLP BibTeX RDF |
|
25 | Bhupendra Singh, Lexy Alexander, Sanjay Burman |
On Algebraic Relations of Serpent S-Boxes. |
IACR Cryptol. ePrint Arch. |
2009 |
DBLP BibTeX RDF |
|
25 | Issam W. Damaj, May Itani, Hassan B. Diab |
Serpent Cryptography on Static and Dynamic Reconfigurable Hardware. |
AICCSA |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Christophe De Cannière |
Serpent. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Eli Biham, Orr Dunkelman, Nathan Keller |
The Rectangle Attack - Rectangling the Serpent. |
IACR Cryptol. ePrint Arch. |
2001 |
DBLP BibTeX RDF |
|
25 | Wenling Wu, Dengguo Feng, Sihan Qing |
Power Analysis of RC6 and Serpent. |
SEC |
2000 |
DBLP BibTeX RDF |
|
25 | Dag Arne Osvik |
Speeding up Serpent. |
AES Candidate Conference |
2000 |
DBLP BibTeX RDF |
|
25 | Tadayoshi Kohno, John Kelsey, Bruce Schneier |
Preliminary Cryptanalysis of Reduced-Round Serpent. |
AES Candidate Conference |
2000 |
DBLP BibTeX RDF |
|
25 | Ross J. Anderson, Eli Biham, Lars R. Knudsen |
The Case for Serpent. |
AES Candidate Conference |
2000 |
DBLP BibTeX RDF |
|
25 | Ross J. Anderson, Eli Biham, Lars R. Knudsen |
Serpent and Smartcards. |
CARDIS |
1998 |
DBLP DOI BibTeX RDF |
|
25 | Eli Biham, Ross J. Anderson, Lars R. Knudsen |
Serpent: A New Block Cipher Proposal. |
FSE |
1998 |
DBLP DOI BibTeX RDF |
|
25 | D. Akrigg, Terri K. Attwood, Alan J. Bleasby, John B. C. Findlay, A. C. North, N. A. Maughan, David J. Parry-Smith, D. N. Perkins, J. C. Wootton |
SERPENT - an information storage and analysis resource for protein sequences. |
Comput. Appl. Biosci. |
1992 |
DBLP DOI BibTeX RDF |
|
17 | Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg |
Multidimensional Extension of Matsui's Algorithm 2. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas T. Courtois, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin, Hervé Sibert |
Sosemanuk, a Fast Software-Oriented Stream Cipher. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Zhihua Hu, Zhongping Qin, Haiqing Han |
Cryptanalysis of Spent with Systems of Algebraic Equations. |
CSSE (4) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Philipp Grabher, Johann Großschädl, Dan Page |
Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography. |
CHES |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Johann Großschädl, Stefan Tillich, Christian Rechberger, Michael Hofmann 0007, Marcel Medwed |
Energy evaluation of software implementations of block ciphers under memory constraints. |
DATE |
2007 |
DBLP DOI BibTeX RDF |
energy optimization, code size reduction, symmetric cipher, lightweight cryptography, memory footprint |
17 | Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater |
Improving the Time Complexity of Matsui's Linear Cryptanalysis. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
Fast Fourier Transform, block ciphers, linear cryptanalysis |
17 | Maounil Messaoud, Fatma Zohra Nouri |
Image Restoration by Partial Differential Equations. |
GMAI |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Jianjun Duan, Joe Hurd, Guodong Li, Scott Owens, Konrad Slind, Junxing Zhang |
Functional Correctness Proofs of Encryption Algorithms. |
LPAR |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Carlos Cid, Gaëtan Leurent |
An Analysis of the XSL Algorithm. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
XSL algorithm, T? method, AES, Linearization |
17 | Armando Solar-Lezama, Rodric M. Rabbah, Rastislav Bodík, Kemal Ebcioglu |
Programming by sketching for bit-streaming programs. |
PLDI |
2005 |
DBLP DOI BibTeX RDF |
domain specific compiler, domain specific language, sketching, synchronous dataflow, stream programming, StreamIt |
17 | Abbas Ghaemi Bafghi, Babak Sadeghiyan |
Finding suitable differential characteristics for block ciphers with Ant colony technique. |
ISCC |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Bo-Yin Yang, Jiun-Ming Chen |
Theoretical Analysis of XL over Small Fields. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Greg Snider, Barry Shackleford, Richard J. Carter |
Attacking the semantic gap between application programming languages and configurable hardware. |
FPGA |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Routo Terada, Paulo G. Pinheiro |
Quadratic Relations for S-Boxes: Their Minimum Representations and Bounds. |
ISC |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Eli Biham, Vladimir Furman, Michal Misztal, Vincent Rijmen |
Differential Cryptanalysis of Q. |
FSE |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moriai, Junko Nakajima, Toshio Tokita |
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis. |
Selected Areas in Cryptography |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Joan Daemen, Michaël Peeters, Gilles Van Assche |
Bitslice Ciphers and Power Analysis Attacks. |
FSE |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Lars R. Knudsen |
Advanced Encryption Standard (AES) - An Update. |
IMACC |
1999 |
DBLP DOI BibTeX RDF |
|