Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article - MaRDI portal

scientific article

From MaRDI portal
Publication:3046344

zbMath1045.94527MaRDI QIDQ3046344

David Wagner, Lars R. Knudsen

Publication date: 12 August 2004

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2365/23650112.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

WARP: revisiting GFN for lightweight 128-bit block cipherSQUARE attack on block ciphers with low algebraic degreeSecurity evaluation of MISTY structure with SPN round functionThe \(t\)-wise independence of substitution-permutation networksAmplifying Side-Channel Attacks with Techniques from Block Cipher CryptanalysisMeet-in-the-Middle Technique for Integral Attacks against Feistel CiphersAutomatic search for bit-based division propertyMore accurate division property propagations based on optimized implementations of linear layersMixture integral attacks on reduced-round AES with a known/secret S-boxIntegral attacks on Pyjamask-96 and round-reduced Pyjamask-128Survey on recent trends towards generalized differential and boomerang uniformitiesA greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysisStructural cryptanalysis of SASASIntegral cryptanalysis on full MISTY1Format-Preserving Encryption Algorithms Using Families of Tweakable BlockciphersImpossible Differential Cryptanalysis and Integral Cryptanalysis of the ACE-Class PermutationMasking Tables—An Underestimated Security RiskCUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to MaskImproved key-recovery attacks on reduced-round WEM-8Rotational-XOR differential rectangle cryptanalysis on \textsc{Simon}-like ciphersThe DBlock family of block ciphersKnown-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modesImproved graph-based model for recovering superpoly on TriviumCryptanalysis of reduced round SPEEDYA theoretical analysis of generalized invariants of bijective S-boxesImproved division property for ciphers with complex linear layersConditional Cube Searching and Applications on Trivium-Variant CiphersDesign Strategies for ARX with Provable Bounds: Sparx and LAXApplying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block CiphersExploring the optimality of byte-wise permutations of a piccolo-type block CipherCryptanalysis of CiminionRAMus- a new lightweight block cipher for RAM encryptionLayout graphs, random walks and the \(t\)-wise independence of SPN block ciphersA geometric approach to linear cryptanalysisMassive superpoly recovery with nested monomial predictionsMathematical aspects of division propertyFull round zero-sum distinguishers on \textsf{TinyJAMBU}-128 and \textsf{TinyJAMBU}-192 keyed-permutation in the known-key settingNew differential bounds and division property of Lilliput: block cipher with extended generalized Feistel networkAn algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sumsLower bounds on the degree of block ciphersThe higher-order meet-in-the-middle attack and its application to the Camellia block cipherIntegral distinguishers for reduced-round StribogExperimental Evaluation of Book Drawing AlgorithmsKnown-Key Distinguishers for Some Block CiphersIntegral attacks on round-reduced Bel-T-256Finding integral distinguishers with easePractical-time attacks against reduced variants of~MISTY1Bit-Based Division Property and Application to Simon FamilyIntegrals Go Statistical: Cryptanalysis of Full Skipjack VariantsStriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012LBlock: A Lightweight Block CipherImproving the security and efficiency of block ciphers based on LS-designsStatistical integral attack on CAST-256 and IDEAAn improved degree evaluation method of NFSR-based cryptosystemsStatistical integral distinguisher with multi-structure and its application on AES-like ciphersOn Integral Distinguishers of Rijndael Family of CiphersAn Improved Impossible Differential Attack on MISTY1Block cipher invariants as eigenvectors of correlation matricesImproving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1Improved differential-linear attacks with applications to ARX ciphersCryptanalysis of Feistel Networks with Secret Round FunctionsAnalysis of the CAESAR Candidate SilverA Statistical Saturation Attack against the Block Cipher PRESENTModeling for three-subset division property without unknown subsetВероятностные характеристики разностных и линейных соотношений для неоднородной линейной средыРазностные характеристики основных операций ARX-шифровZero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256Modeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEADCryptographic Properties and Application of a Generalized Unbalanced Feistel Network StructureDistinguishers for Ciphers and Known Key Attack against Rijndael with Large BlocksWide Trail Design Strategy for Binary MixColumnsOn the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon VariantsThe SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTISSAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluationsA $$2^{70}$$ Attack on the Full MISTY1New Insights on AES-Like SPN CiphersAnother View of the Division PropertyRevisiting Gilbert's known-key distinguisherNew Directions in Cryptanalysis of Self-Synchronizing Stream CiphersImproved differential-linear attacks with applications to ARX ciphersOut of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systemsIntegral characteristics by keyspace partitioning