scientific article; zbMATH DE number 503238
From MaRDI portal
Publication:4279560
zbMath0787.94014MaRDI QIDQ4279560
Publication date: 7 March 1994
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (only showing first 100 items - show all)
On the guaranteed number of activations in $\mathsf{XS}$-circuits ⋮ Rotational-XOR differential rectangle cryptanalysis on \textsc{Simon}-like ciphers ⋮ Effective and efficient masking with low noise using small-Mersenne-prime ciphers ⋮ New method for combining Matsui's bounding conditions with sequential encoding method ⋮ A further study on bridge structures and constructing bijective S-boxes for low-latency masking ⋮ A new class of differential 4-uniform permutations from exponential permutation ⋮ Fully automated differential-linear attacks against ARX ciphers ⋮ A theoretical analysis of generalized invariants of bijective S-boxes ⋮ Key structures: improved related-key boomerang attack against the full AES-256 ⋮ Non-existence of one-byte active impossible differentials for 5-round AES in the master-key setting ⋮ Differential cryptanalysis of round-reduced \texttt{SPEEDY} family ⋮ On the field-based division property: applications to MiMC, Feistel MiMC and GMiMC ⋮ On perfect linear approximations and differentials over two-round SPNs ⋮ Differential meet-in-the-middle cryptanalysis ⋮ Moving a step of ChaCha in syncopated rhythm ⋮ BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers ⋮ Clustering effect in \textsc{Simon} and \textsc{Simeck} ⋮ Generic framework for key-guessing improvements ⋮ \textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher ⋮ Automated key recovery attacks on round-reduced Orthros ⋮ Differential cryptanalysis in the fixed-key model ⋮ Invertible quadratic non-linear functions over \(\mathbb{F}_p^n\) via multiple local maps ⋮ \textsc{Poseidon}2: a faster version of the \textsc{Poseidon} hash function ⋮ Twin column parity mixers and Gaston. A new mixing layer and permutation ⋮ \texttt{Horst} meets \textit{Fluid}-SPN: Griffin for zero-knowledge applications ⋮ Automatic boomerang attacks search on Rijndael ⋮ Unnamed Item ⋮ Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006 ⋮ CRITERIA FOR MARKOV BLOCK CIPHERS ⋮ Двойственность разностного и линейного методов в криптографии ⋮ Randomness and Representation of Span n Sequences ⋮ The Delicate Issues of Addition with Respect to XOR Differences ⋮ Fault Analysis Study of IDEA ⋮ Unnamed Item ⋮ New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers ⋮ Improved differential-linear attacks with applications to ARX ciphers ⋮ A Bird’s-Eye View of Modern Symmetric Cryptography from Combinatorial Designs ⋮ A Search Strategy to Optimize the Affine Variant Properties of S-Boxes ⋮ Algorithm 959 ⋮ Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties ⋮ Cryptographic Analysis of All 4 × 4-Bit S-Boxes ⋮ Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher ⋮ Thinking outside the superbox ⋮ \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations ⋮ Weak-key distinguishers for AES ⋮ Improved (related-key) differential cryptanalysis on GIFT ⋮ A homophonic DES ⋮ Another look at normal approximations in cryptanalysis ⋮ Multiple differential-zero correlation linear cryptanalysis of reduced-round CAST-256 ⋮ eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices ⋮ Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails ⋮ Resistance of balanced s-boxes to linear and differential cryptanalysis ⋮ Projective aspects of the AES inversion ⋮ Differential-linear cryptanalysis of the lightweight crytographic algorithm KNOT ⋮ More accurate division property propagations based on optimized implementations of linear layers ⋮ Cryptanalysis of the permutation based algorithm SpoC ⋮ Computing expected differential probability of (truncated) differentials and expected linear potential of (multidimensional) linear hulls in SPN block ciphers ⋮ A method to calculate differential uniformity for permutations ⋮ New attacks from old distinguishers improved attacks on serpent ⋮ Pholkos -- efficient large-state tweakable block ciphers from the AES round function ⋮ Differential uniformity and linearity of S-boxes by multiplicative complexity ⋮ Capability of evolutionary cryptosystems against differential cryptanalysis ⋮ Revamped differential-linear cryptanalysis on reduced round ChaCha ⋮ A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis ⋮ Information-combining differential fault attacks on DEFAULT ⋮ Multiple (truncated) differential cryptanalysis: explicit upper bounds on data complexity ⋮ Differential-linear cryptanalysis revisited ⋮ Integral cryptanalysis on full MISTY1 ⋮ A pseudorandom number generator based on worst-case lattice problems ⋮ Rigorous upper bounds on data complexities of block cipher cryptanalysis ⋮ On the relationship between resilient Boolean functions and linear branch number of S-boxes ⋮ If a generalised butterfly is APN then it operates on 6 bits ⋮ Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT ⋮ A new matrix form to generate all \(3\times 3\) involutory MDS matrices over \(\mathbb{F}_{2^m}\) ⋮ CUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to Mask ⋮ Rotational-linear attack: a new framework of cryptanalysis on ARX ciphers with applications to Chaskey ⋮ Nonlinear Invariant Attack ⋮ The Stream Cipher HC-128 ⋮ Cryptanalysis of Reduced-Round SMS4 Block Cipher ⋮ On the construction of hardware-friendly \(4\times4\) and \(5\times5\) S-boxes ⋮ An algebraic attack on ciphers with low-degree round functions: application to full MiMC ⋮ Differential attack on five rounds of the SC2000 block cipher ⋮ The phantom of differential characteristics ⋮ Impossible Differential Cryptanalysis of CLEFIA ⋮ Linear hulls with correlation zero and linear cryptanalysis of block ciphers ⋮ Improved Differential Cryptanalysis of CAST-128 and CAST-256 ⋮ SPF: A New Family of Efficient Format-Preserving Encryption Algorithms ⋮ One-way hash functions with changeable parameters. ⋮ Mind the gap -- a closer look at the security of block ciphers against differential cryptanalysis ⋮ Two notions of differential equivalence on Sboxes ⋮ Information leakage of VGF2 structure ⋮ AKF: a key alternating Feistel scheme for lightweight cipher designs ⋮ Finding the differential characteristics of block ciphers with neural networks ⋮ On CCZ-equivalence, extended-affine equivalence, and function twisting ⋮ A methodology for differential-linear cryptanalysis and its applications ⋮ Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations ⋮ Multiple Differential Cryptanalysis: Theory and Practice ⋮ Breaking Grain-128 with Dynamic Cube Attacks ⋮ Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes ⋮ Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity
This page was built for publication: