Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1942409 - MaRDI portal

scientific article; zbMATH DE number 1942409

From MaRDI portal
Publication:4409105

zbMath1026.94537MaRDI QIDQ4409105

Sean Murphy, Matthew J. B. Robshaw

Publication date: 30 June 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2442/24420001.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Quantum algorithm for Boolean equation solving and quantum algebraic attack on cryptosystems, Cryptanalysis of full LowMC and LowMC-M with algebraic techniques, Projective aspects of the AES inversion, Construction of \(\mathrm{S}_8\) Liu J S-boxes and their applications, Complementing Feistel Ciphers, A Very Compact “Perfectly Masked” S-Box for AES, Obtaining and solving systems of equations in key variables only for the small variants of AES, An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums, On Cryptographically Significant Mappings over GF(2 n ), A Five-Round Algebraic Property of the Advanced Encryption Standard, Cryptographic properties and application of a generalized unbalanced Feistel network structure, Algebraic Attacks on the Courtois Toy Cipher, Affine equivalence in the AES round function, Penalized semidefinite programming for quadratically-constrained quadratic optimization, On some probabilistic approximations for AES-like S-boxes, Algebraic Cryptanalysis of the Data Encryption Standard, An application of the O'Nan-Scott theorem to the group generated by the round functions of an AES-like cipher, Group theoretic properties of Rijndael-like ciphers, New Description of SMS4 by an Embedding overGF(28), Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure, Practical Algebraic Attacks on the Hitag2 Stream Cipher, Cryptanalysis of Rijndael S-box and improvement