The \(t\)-wise independence of substitution-permutation networks
From MaRDI portal
Publication:2139644
DOI10.1007/978-3-030-84259-8_16zbMath1489.94104OpenAlexW3164186972MaRDI QIDQ2139644
Vinod Vaikuntanathan, Tianren Liu, Stefano Tessaro
Publication date: 18 May 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-84259-8_16
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- An application of the O'Nan-Scott theorem to the group generated by the round functions of an AES-like cipher
- Differential cryptanalysis of DES-like cryptosystems
- Is the data encryption standard a group? (Results of cycling experiments on DES)
- A weak cipher that generates the symmetric group
- Provable security of (tweakable) block ciphers based on substitution-permutation networks
- Provable security against a differential attack
- Decorrelation: a theory for block cipher security
- Perfect nonlinear functions and cryptography
- Simple permutations mix well
- Tight security analysis of 3-round key-alternating cipher with a single permutation
- A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers
- Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security
- On the Indifferentiability of Key-Alternating Ciphers
- Minimizing the Two-Round Even-Mansour Cipher
- Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations
- Security Analysis of Key-Alternating Feistel Ciphers
- MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
- Biclique Cryptanalysis of the Full AES
- Simple permutations mix even better
- Understanding Two-Round Differentials in AES
- Indistinguishability Amplification
- Markov Ciphers and Differential Cryptanalysis
- Generators for Certain Alternating Groups with Applications to Cryptography
- On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis
- The interpolation attack on block ciphers
- Higher Order Derivatives and Differential Cryptanalysis
- Analysis of Boolean Functions
- On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation
- Advanced Encryption Standard – AES
- Tight Security Bounds for Key-Alternating Ciphers
- Proving the Security of AES Substitution-Permutation Network
- Indifferentiability of Confusion-Diffusion Networks
- Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs
- Fast Software Encryption
This page was built for publication: The \(t\)-wise independence of substitution-permutation networks