The Wide Trail Design Strategy

From MaRDI portal
Publication:4550270

DOI10.1007/3-540-45325-3_20zbMath0998.94541OpenAlexW1507705751MaRDI QIDQ4550270

Vincent Rijmen, Joan Daemen

Publication date: 25 November 2002

Published in: Cryptography and Coding (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-45325-3_20




Related Items

Thinking outside the superboxSecurity evaluation of MISTY structure with SPN round functionSEA: A Scalable Encryption Algorithm for Small Embedded ApplicationseSPF: A Family of Format-Preserving Encryption Algorithms Using MDS MatricesCounting active S-boxes is not enoughUpper bound of the length of truncated impossible differentials for AESOn the guaranteed number of activations in $\mathsf{XS}$-circuitsPractical security against linear cryptanalysis for SMS4-like ciphers with SP round functionConnecting tweakable and multi-key blockcipher securityAnalysis of NORX: Investigating Differential and Rotational PropertiesTowards Understanding the Known-Key Security of Block CiphersALE: AES-Based Lightweight Authenticated EncryptionDifferential Attacks Against SPN: A Thorough AnalysisGeneralization of Matsui's Algorithm 1 to linear hull for key-alternating block ciphersEffective and efficient masking with low noise using small-Mersenne-prime ciphersFrom Farfalle to \textsc{Megafono} via Ciminion: the PRF \textsc{Hydra} for MPC applicationsOn construction of lightweight MDS matricesSimpira v2: A Family of Efficient Permutations Using the AES Round FunctionDesign Strategies for ARX with Provable Bounds: Sparx and LAXOn perfect linear approximations and differentials over two-round SPNsCryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato}A geometric approach to linear cryptanalysisSequential indifferentiability of confusion-diffusion networksProvable security of HADES structureInvertible quadratic non-linear functions over \(\mathbb{F}_p^n\) via multiple local maps\textsc{Poseidon}2: a faster version of the \textsc{Poseidon} hash function\texttt{Horst} meets \textit{Fluid}-SPN: Griffin for zero-knowledge applicationsCryptanalysis of masked ciphers: a not so random ideaExperiments on the Multiple Linear Cryptanalysis of Reduced Round SerpentSPF: A New Family of Efficient Format-Preserving Encryption AlgorithmsVortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less MultiplicationNew Applications of Differential Bounds of the SDS StructureMind the gap -- a closer look at the security of block ciphers against differential cryptanalysisAnalysis of the Kupyna-256 Hash FunctionMultidimensional zero-correlation linear cryptanalysis of reduced round SPARX-128Improving the security and efficiency of block ciphers based on LS-designsThe resistance of PRESENT-80 against related-key differential attacksBlock cipher invariants as eigenvectors of correlation matricesNonlinear diffusion layersSpeeding up Collision Search for Byte-Oriented Hash FunctionsProvable security of block ciphers against linear cryptanalysis: a mission impossible?On the Diffusion of Generalized Feistel Structures Regarding Differential and Linear CryptanalysisSubspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash FunctionImpossible Differential Attack on Reduced Round SPARX-64/128The rebound attack and subspace distinguishers: application to WhirlpoolOn a generalization of substitution-permutation networks: the HADES design strategy