default search action
Jorge Nakahara Jr.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i6]Jorge Nakahara Jr.:
Double-Matrix: Complete Diffusion in a Single Round with (small) MDS Matrices. IACR Cryptol. ePrint Arch. 2024: 1624 (2024) - 2020
- [i5]Jorge Nakahara Jr.:
A Differential and Linear Analysis of the Inversion Mapping in Odd-Characteristic Finite Fields. IACR Cryptol. ePrint Arch. 2020: 1166 (2020)
2010 – 2019
- 2015
- [c25]Jorge Nakahara Jr.:
Cryptanalysis of the Full 8.5-Round REESSE3+ Block Cipher. LATINCRYPT 2015: 170-186 - 2014
- [j5]Alex Biryukov, Jorge Nakahara Jr., Hamdi Murat Yildirim:
Differential entropy analysis of the IDEA block cipher. J. Comput. Appl. Math. 259: 561-570 (2014) - [j4]Frédéric Lafitte, Jorge Nakahara Jr., Dirk Van Heule:
Applications of SAT Solvers in Cryptanalysis: Finding Weak Keys and Preimages. J. Satisf. Boolean Model. Comput. 9(1): 1-25 (2014) - 2013
- [c24]Liran Lerman, Jorge Nakahara Jr., Nikita Veshchikov:
Improving Block Cipher Design by Rearranging Internal Operations. SECRYPT 2013: 27-38 - [c23]Daniel Santana de Freitas, Jorge Nakahara Jr.:
Non-random Properties of Compression and Hash Functions using Linear Cryptanalysis. SECRYPT 2013: 471-477 - 2012
- [c22]Jorge Nakahara Jr.:
Differential and Linear Attacks on the Full WIDEA-n Block Ciphers (under Weak Keys). CANS 2012: 56-71 - [c21]Liran Lerman, Olivier Markowitch, Jorge Nakahara Jr.:
Key Management as a Service. SECRYPT 2012: 276-281 - 2011
- [c20]Jorge Nakahara Jr.:
New Impossible Differential and Known-Key Distinguishers for the 3D Cipher. ISPEC 2011: 208-221 - 2010
- [c19]Aslí Bay, Jorge Nakahara Jr., Serge Vaudenay:
Cryptanalysis of Reduced-Round MIBS Block Cipher. CANS 2010: 1-19 - [c18]Stéphane Badel, Nilay Dagtekin, Jorge Nakahara Jr., Khaled Ouafi, Nicolas Reffé, Pouyan Sepehrdad, Petr Susil, Serge Vaudenay:
ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware. CHES 2010: 398-412 - [c17]Gregory V. Bard, Nicolas T. Courtois, Jorge Nakahara Jr., Pouyan Sepehrdad, Bingsheng Zhang:
Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers. INDOCRYPT 2010: 176-196
2000 – 2009
- 2009
- [j3]Jorge Nakahara Jr.:
On the Order of Round Components in the AES. Int. J. Netw. Secur. 9(1): 44-50 (2009) - [j2]Jorge Nakahara Jr., Élcio Abrahão:
A New Involutory MDS Matrix for the AES. Int. J. Netw. Secur. 9(2): 109-116 (2009) - [j1]Jorge Nakahara Jr.:
Analysis of Venkaiah et al.'s AES Design. Int. J. Netw. Secur. 9(3): 285-289 (2009) - [c16]Jorge Nakahara Jr., Pouyan Sepehrdad, Bingsheng Zhang, Meiqin Wang:
Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT. CANS 2009: 58-75 - [c15]Jean-Philippe Aumasson, Jorge Nakahara Jr., Pouyan Sepehrdad:
Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2). FSE 2009: 296-307 - [c14]Jorge Nakahara Jr., Gautham Sekar, Daniel Santana de Freitas, Chang Chiann, Ramon Hugo de Souza, Bart Preneel:
A New Approach to chi2 Cryptanalysis of Block Ciphers. ISC 2009: 1-16 - [c13]Meiqin Wang, Jorge Nakahara Jr., Yue Sun:
Cryptanalysis of the Full MMB Block Cipher. Selected Areas in Cryptography 2009: 231-248 - [i4]Jorge Nakahara Jr., Daniel Santana de Freitas:
Mini-ciphers: a reliable testbed for cryptanalysis? Symmetric Cryptography 2009 - 2008
- [c12]Jorge Nakahara Jr.:
3D: A Three-Dimensional Block Cipher. CANS 2008: 252-267 - 2007
- [c11]Jorge Nakahara Jr.:
A Linear Analysis of Blowfish and Khufu. ISPEC 2007: 20-32 - [c10]Jorge Nakahara Jr., Ivan Carlos Pavão:
Impossible-Differential Attacks on Large-Block Rijndael. ISC 2007: 104-117 - 2005
- [c9]Jorge Nakahara Jr., Daniel Santana de Freitas, Raphael Chung-Wei Phan:
New Multiset Attacks on Rijndael with Large Blocks. Mycrypt 2005: 277-295 - 2004
- [c8]Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle:
The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers. ACISP 2004: 98-109 - [c7]Jorge Nakahara Jr.:
Faster Variants of the MESH Block Ciphers. INDOCRYPT 2004: 162-174 - [c6]Jorge Nakahara Jr., Daniel Santana de Freitas:
Cryptanalysis of Ake98. INDOCRYPT 2004: 206-217 - 2003
- [c5]Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle:
A Note on Weak Keys of PES, IDEA, and Some Extended Variants. ISC 2003: 267-279 - [c4]Jorge Nakahara Jr., Vincent Rijmen, Bart Preneel, Joos Vandewalle:
The MESH Block Ciphers. WISA 2003: 458-473 - 2002
- [c3]Alex Biryukov, Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle:
New Weak-Key Classes of IDEA. ICICS 2002: 315-326 - [i3]Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle:
Square Attacks on Reduced-Round Variants of the Skipjack Block Cipher. IACR Cryptol. ePrint Arch. 2002: 3 (2002) - [i2]Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle:
A note on Weak Keys of PES, IDEA and some Extended Variants. IACR Cryptol. ePrint Arch. 2002: 152 (2002) - 2001
- [c2]Paulo S. L. M. Barreto, Vincent Rijmen, Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle, Hae Yong Kim:
Improved SQUARE Attacks against Reduced-Round HIEROCRYPT. FSE 2001: 165-173 - [i1]Jorge Nakahara Jr., Paulo S. L. M. Barreto, Bart Preneel, Joos Vandewalle, Hae Y. Kim:
SQUARE Attacks on Reduced-Round PES and IDEA Block Ciphers. IACR Cryptol. ePrint Arch. 2001: 68 (2001) - 2000
- [c1]Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle:
Linear Cryptanalysis of Reduced-Round Versions of the SAFER Block Cipher Family. FSE 2000: 244-261
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint