scientific article; zbMATH DE number 1394292
From MaRDI portal
Publication:4934705
zbMath0951.94519MaRDI QIDQ4934705
Publication date: 31 January 2000
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (only showing first 100 items - show all)
SQUARE attack on block ciphers with low algebraic degree ⋮ MixColumns Coefficient Property and Security of the AES with A Secret S-Box ⋮ eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices ⋮ On group rings and some of their applications to combinatorics and symmetric cryptography ⋮ On the guaranteed number of activations in $\mathsf{XS}$-circuits ⋮ An algorithm for computing the upper bound for non-minimum weight differentials in 2-round LSX-ciphers ⋮ Quantum differential and linear cryptanalysis ⋮ Primitivity of PRESENT and other lightweight ciphers ⋮ Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECK ⋮ Impossible Differential Cryptanalysis and Integral Cryptanalysis of the ACE-Class Permutation ⋮ On nonlinearity of Boolean functions generated by the generalized Dobbertin construction ⋮ Characteristics of nonlinearity of vectorial functions over finite fields ⋮ Rotational-XOR differential rectangle cryptanalysis on \textsc{Simon}-like ciphers ⋮ Effective and efficient masking with low noise using small-Mersenne-prime ciphers ⋮ New method for combining Matsui's bounding conditions with sequential encoding method ⋮ A further study on bridge structures and constructing bijective S-boxes for low-latency masking ⋮ Construction of highly nonlinear permutations on \(\mathbb{Z}_{2p}\) with differential uniformity at most 8 ⋮ Another look at key randomisation hypotheses ⋮ Fully automated differential-linear attacks against ARX ciphers ⋮ Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation ⋮ FUTURE: a lightweight block cipher using an optimal diffusion matrix ⋮ A theoretical analysis of generalized invariants of bijective S-boxes ⋮ Key structures: improved related-key boomerang attack against the full AES-256 ⋮ Linear Cryptanalysis of Reduced-Round Speck with a Heuristic Approach: Automatic Search for Linear Trails ⋮ An efficient encoding mechanism against eavesdropper with side channel information ⋮ Generalized Hamming weights of linear codes from cryptographic functions ⋮ A New Design of Substitution Box with Ideal Strict Avalanche Criterion ⋮ Clustering effect of iterative differential and linear trails ⋮ RAMus- a new lightweight block cipher for RAM encryption ⋮ On the field-based division property: applications to MiMC, Feistel MiMC and GMiMC ⋮ On perfect linear approximations and differentials over two-round SPNs ⋮ Differential meet-in-the-middle cryptanalysis ⋮ Moving a step of ChaCha in syncopated rhythm ⋮ A Super-Set of Patterson--Wiedemann Functions: Upper Bounds and Possible Nonlinearities ⋮ Efficient Chaotic Encryption Scheme with OFB Mode ⋮ Lombardi Drawings of Knots and Links ⋮ Experimental Evaluation of Book Drawing Algorithms ⋮ Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006 ⋮ On Large Distributions for Linear Cryptanalysis ⋮ Partitioning cryptanalysis ⋮ The interpolation attack on block ciphers ⋮ The design of the ICE encryption algorithm ⋮ Improving linear cryptanalysis of LOKI91 by probabilistic counting method ⋮ The block cipher Square ⋮ New Results in Linear Cryptanalysis of RC5 ⋮ Higher Order Differential Attack of a CAST Cipher ⋮ CS-Cipher ⋮ On the Design and Security of RC2 ⋮ Serpent: A New Block Cipher Proposal ⋮ MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck ⋮ Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques ⋮ Cryptanalysis of Reduced NORX ⋮ Двойственность разностного и линейного методов в криптографии ⋮ StriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012 ⋮ Higher-order nonlinearity of Kasami functions ⋮ Robust Encryption, Revisited ⋮ Unnamed Item ⋮ Some Results on the Known Classes of Quadratic APN Functions ⋮ On the Multi-output Filtering Model and Its Applications ⋮ Quantum Algorithms Related to $$\textit{HN}$$ -Transforms of Boolean Functions ⋮ Correlation theorems in cryptanalysis ⋮ Distinguishing Distributions Using Chernoff Information ⋮ Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent ⋮ Unnamed Item ⋮ Block cipher invariants as eigenvectors of correlation matrices ⋮ Efficient Computation of the Best Quadratic Approximations of Cubic Boolean Functions ⋮ Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes ⋮ Algebraic Cryptanalysis of the Data Encryption Standard ⋮ Randomness and Representation of Span n Sequences ⋮ More constructions of differentially 4-uniform permutations on \(\mathbb {F}_{2^{2k}}\) ⋮ Related-Key Differential-Linear Attacks on Reduced AES-192 ⋮ Improved Meet-in-the-Middle Attacks on Reduced-Round DES ⋮ Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1 ⋮ Improved differential-linear attacks with applications to ARX ciphers ⋮ A Statistical Saturation Attack against the Block Cipher PRESENT ⋮ Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure ⋮ The Cryptanalysis of Reduced-Round SMS4 ⋮ Bounds on Fixed Input/Output Length Post-processing Functions for Biased Physical Random Number Generators ⋮ New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256 ⋮ Multiple encryption with minimum key ⋮ Unnamed Item ⋮ Unnamed Item ⋮ Unnamed Item ⋮ Unnamed Item ⋮ Unnamed Item ⋮ 3D: A Three-Dimensional Block Cipher ⋮ The Complexity of Distinguishing Distributions (Invited Talk) ⋮ Reflection Cryptanalysis of Some Ciphers ⋮ A Differential-Linear Attack on 12-Round Serpent ⋮ Improved differential-linear attacks with applications to ARX ciphers ⋮ Side channel cryptanalysis of product ciphers ⋮ On the Role of Key Schedules in Attacks on Iterated Ciphers ⋮ A Bird’s-Eye View of Modern Symmetric Cryptography from Combinatorial Designs ⋮ Pseudorandom Functions: Three Decades Later ⋮ A Super-Set of Patterson-Wiedemann Functions – Upper Bounds and Possible Nonlinearities ⋮ Heuristic algorithm for obtaining permutations with given cryptographic properties using a generalized construction ⋮ On known constructions of APN and AB functions and their relation to each other ⋮ Algorithm 959 ⋮ Feedback linearly extended discrete functions ⋮ Cryptographic Analysis of All 4 × 4-Bit S-Boxes
This page was built for publication: