Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 708826 - MaRDI portal

scientific article; zbMATH DE number 708826

From MaRDI portal
Publication:4318717

zbMath0809.94017MaRDI QIDQ4318717

Eli Biham, Adi Shamir

Publication date: 30 March 1995


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

WARP: revisiting GFN for lightweight 128-bit block cipher, A public key cryptosystem based on data complexity under quantum environment, A homophonic DES, Multiple differential-zero correlation linear cryptanalysis of reduced-round CAST-256, Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES, Differential-ML distinguisher: machine learning based generic extension for differential cryptanalysis, MILP based differential attack on round reduced WARP, Survey on recent trends towards generalized differential and boomerang uniformities, Capability of evolutionary cryptosystems against differential cryptanalysis, Substitution-permutation networks resistant to differential and linear cryptanalysis, Differential cryptanalysis of Lucifer, Unnamed Item, A pseudorandom number generator based on worst-case lattice problems, On the computational power of the light: a plan for breaking data encryption standard, Rapid solution of problems by quantum computation, Key structures: improved related-key boomerang attack against the full AES-256, Modeling large S-box in MILP and a (related-key) differential attack on full round PIPO-64/128, Unnamed Item, A New Design of Substitution Box with Ideal Strict Avalanche Criterion, Differential meet-in-the-middle cryptanalysis, Differential cryptanalysis in the fixed-key model, Optimising linear key recovery attacks with affine Walsh transform pruning, Accurate estimates of the data complexity and success probability for various cryptanalyses, Square reflection cryptanalysis of 5-round Feistel networks with permutations, Differential attack on nine rounds of the SEED block cipher, On properties of translation groups in the affine general linear group with applications to cryptography, CS-Cipher, Cryptanalysis of Reduced NORX, A methodology for differential-linear cryptanalysis and its applications, Improved Feistel-based ciphers for wireless sensor network security, Search for Related-Key Differential Characteristics in DES-Like Ciphers, Upper bounds for the average probabilities of difference characteristics of block ciphers with alternation of Markov transformations and generalized Markov transformations, Scalable PP-1 block cipher, Image cipher applications using the elliptical curve and chaos, A Theoretical Study of Kolmogorov-Smirnov Distinguishers, An Improved Differential Attack on Full GOST, Numerical solvers and cryptanalysis, Pairs and triplets of DES S-boxes, Provable security against a differential attack, A white-box speck implementation using self-equivalence encodings, Difference of function on vector space over \(\mathbb F\), A Bird’s-Eye View of Modern Symmetric Cryptography from Combinatorial Designs, Heuristic algorithm for obtaining permutations with given cryptographic properties using a generalized construction, Quantum differential cryptanalysis