scientific article
From MaRDI portal
Publication:3046344
zbMath1045.94527MaRDI QIDQ3046344
Publication date: 12 August 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2365/23650112.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Theory of software (68N99)
Related Items
WARP: revisiting GFN for lightweight 128-bit block cipher ⋮ SQUARE attack on block ciphers with low algebraic degree ⋮ Security evaluation of MISTY structure with SPN round function ⋮ The \(t\)-wise independence of substitution-permutation networks ⋮ Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis ⋮ Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers ⋮ Automatic search for bit-based division property ⋮ More accurate division property propagations based on optimized implementations of linear layers ⋮ Mixture integral attacks on reduced-round AES with a known/secret S-box ⋮ Integral attacks on Pyjamask-96 and round-reduced Pyjamask-128 ⋮ Survey on recent trends towards generalized differential and boomerang uniformities ⋮ A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis ⋮ Structural cryptanalysis of SASAS ⋮ Integral cryptanalysis on full MISTY1 ⋮ Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers ⋮ Impossible Differential Cryptanalysis and Integral Cryptanalysis of the ACE-Class Permutation ⋮ Masking Tables—An Underestimated Security Risk ⋮ CUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to Mask ⋮ Improved key-recovery attacks on reduced-round WEM-8 ⋮ Rotational-XOR differential rectangle cryptanalysis on \textsc{Simon}-like ciphers ⋮ The DBlock family of block ciphers ⋮ Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes ⋮ Improved graph-based model for recovering superpoly on Trivium ⋮ Cryptanalysis of reduced round SPEEDY ⋮ A theoretical analysis of generalized invariants of bijective S-boxes ⋮ Improved division property for ciphers with complex linear layers ⋮ Conditional Cube Searching and Applications on Trivium-Variant Ciphers ⋮ Design Strategies for ARX with Provable Bounds: Sparx and LAX ⋮ Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers ⋮ Exploring the optimality of byte-wise permutations of a piccolo-type block Cipher ⋮ Cryptanalysis of Ciminion ⋮ RAMus- a new lightweight block cipher for RAM encryption ⋮ Layout graphs, random walks and the \(t\)-wise independence of SPN block ciphers ⋮ A geometric approach to linear cryptanalysis ⋮ Massive superpoly recovery with nested monomial predictions ⋮ Mathematical aspects of division property ⋮ Full round zero-sum distinguishers on \textsf{TinyJAMBU}-128 and \textsf{TinyJAMBU}-192 keyed-permutation in the known-key setting ⋮ New differential bounds and division property of Lilliput: block cipher with extended generalized Feistel network ⋮ An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums ⋮ Lower bounds on the degree of block ciphers ⋮ The higher-order meet-in-the-middle attack and its application to the Camellia block cipher ⋮ Integral distinguishers for reduced-round Stribog ⋮ Experimental Evaluation of Book Drawing Algorithms ⋮ Known-Key Distinguishers for Some Block Ciphers ⋮ Integral attacks on round-reduced Bel-T-256 ⋮ Finding integral distinguishers with ease ⋮ Practical-time attacks against reduced variants of~MISTY1 ⋮ Bit-Based Division Property and Application to Simon Family ⋮ Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants ⋮ StriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012 ⋮ LBlock: A Lightweight Block Cipher ⋮ Improving the security and efficiency of block ciphers based on LS-designs ⋮ Statistical integral attack on CAST-256 and IDEA ⋮ An improved degree evaluation method of NFSR-based cryptosystems ⋮ Statistical integral distinguisher with multi-structure and its application on AES-like ciphers ⋮ On Integral Distinguishers of Rijndael Family of Ciphers ⋮ An Improved Impossible Differential Attack on MISTY1 ⋮ Block cipher invariants as eigenvectors of correlation matrices ⋮ Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1 ⋮ Improved differential-linear attacks with applications to ARX ciphers ⋮ Cryptanalysis of Feistel Networks with Secret Round Functions ⋮ Analysis of the CAESAR Candidate Silver ⋮ A Statistical Saturation Attack against the Block Cipher PRESENT ⋮ Modeling for three-subset division property without unknown subset ⋮ Вероятностные характеристики разностных и линейных соотношений для неоднородной линейной среды ⋮ Разностные характеристики основных операций ARX-шифров ⋮ Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256 ⋮ Modeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEAD ⋮ Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure ⋮ Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks ⋮ Wide Trail Design Strategy for Binary MixColumns ⋮ On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants ⋮ The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS ⋮ SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations ⋮ A $$2^{70}$$ Attack on the Full MISTY1 ⋮ New Insights on AES-Like SPN Ciphers ⋮ Another View of the Division Property ⋮ Revisiting Gilbert's known-key distinguisher ⋮ New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers ⋮ Improved differential-linear attacks with applications to ARX ciphers ⋮ Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems ⋮ Integral characteristics by keyspace partitioning