Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1394292 - MaRDI portal

scientific article; zbMATH DE number 1394292

From MaRDI portal
Publication:4934705

zbMath0951.94519MaRDI QIDQ4934705

Mitsuru Matsui

Publication date: 31 January 2000


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (only showing first 100 items - show all)

SQUARE attack on block ciphers with low algebraic degreeMixColumns Coefficient Property and Security of the AES with A Secret S-BoxeSPF: A Family of Format-Preserving Encryption Algorithms Using MDS MatricesOn group rings and some of their applications to combinatorics and symmetric cryptographyOn the guaranteed number of activations in $\mathsf{XS}$-circuitsAn algorithm for computing the upper bound for non-minimum weight differentials in 2-round LSX-ciphersQuantum differential and linear cryptanalysisPrimitivity of PRESENT and other lightweight ciphersAutomatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECKImpossible Differential Cryptanalysis and Integral Cryptanalysis of the ACE-Class PermutationOn nonlinearity of Boolean functions generated by the generalized Dobbertin constructionCharacteristics of nonlinearity of vectorial functions over finite fieldsRotational-XOR differential rectangle cryptanalysis on \textsc{Simon}-like ciphersEffective and efficient masking with low noise using small-Mersenne-prime ciphersNew method for combining Matsui's bounding conditions with sequential encoding methodA further study on bridge structures and constructing bijective S-boxes for low-latency maskingConstruction of highly nonlinear permutations on \(\mathbb{Z}_{2p}\) with differential uniformity at most 8Another look at key randomisation hypothesesFully automated differential-linear attacks against ARX ciphersEfficient detection of high probability statistical properties of cryptosystems via surrogate differentiationFUTURE: a lightweight block cipher using an optimal diffusion matrixA theoretical analysis of generalized invariants of bijective S-boxesKey structures: improved related-key boomerang attack against the full AES-256Linear Cryptanalysis of Reduced-Round Speck with a Heuristic Approach: Automatic Search for Linear TrailsAn efficient encoding mechanism against eavesdropper with side channel informationGeneralized Hamming weights of linear codes from cryptographic functionsA New Design of Substitution Box with Ideal Strict Avalanche CriterionClustering effect of iterative differential and linear trailsRAMus- a new lightweight block cipher for RAM encryptionOn the field-based division property: applications to MiMC, Feistel MiMC and GMiMCOn perfect linear approximations and differentials over two-round SPNsDifferential meet-in-the-middle cryptanalysisMoving a step of ChaCha in syncopated rhythmA Super-Set of Patterson--Wiedemann Functions: Upper Bounds and Possible NonlinearitiesEfficient Chaotic Encryption Scheme with OFB ModeLombardi Drawings of Knots and LinksExperimental Evaluation of Book Drawing AlgorithmsCryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006On Large Distributions for Linear CryptanalysisPartitioning cryptanalysisThe interpolation attack on block ciphersThe design of the ICE encryption algorithmImproving linear cryptanalysis of LOKI91 by probabilistic counting methodThe block cipher SquareNew Results in Linear Cryptanalysis of RC5Higher Order Differential Attack of a CAST CipherCS-CipherOn the Design and Security of RC2Serpent: A New Block Cipher ProposalMILP-Based Automatic Search Algorithms for Differential and Linear Trails for SpeckImproved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing TechniquesCryptanalysis of Reduced NORXДвойственность разностного и линейного методов в криптографииStriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012Higher-order nonlinearity of Kasami functionsRobust Encryption, RevisitedUnnamed ItemSome Results on the Known Classes of Quadratic APN FunctionsOn the Multi-output Filtering Model and Its ApplicationsQuantum Algorithms Related to $$\textit{HN}$$ -Transforms of Boolean FunctionsCorrelation theorems in cryptanalysisDistinguishing Distributions Using Chernoff InformationImproved and Multiple Linear Cryptanalysis of Reduced Round SerpentUnnamed ItemBlock cipher invariants as eigenvectors of correlation matricesEfficient Computation of the Best Quadratic Approximations of Cubic Boolean FunctionsNon-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-BoxesAlgebraic Cryptanalysis of the Data Encryption StandardRandomness and Representation of Span n SequencesMore constructions of differentially 4-uniform permutations on \(\mathbb {F}_{2^{2k}}\)Related-Key Differential-Linear Attacks on Reduced AES-192Improved Meet-in-the-Middle Attacks on Reduced-Round DESImproving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1Improved differential-linear attacks with applications to ARX ciphersA Statistical Saturation Attack against the Block Cipher PRESENTCryptographic Properties and Application of a Generalized Unbalanced Feistel Network StructureThe Cryptanalysis of Reduced-Round SMS4Bounds on Fixed Input/Output Length Post-processing Functions for Biased Physical Random Number GeneratorsNew Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256Multiple encryption with minimum keyUnnamed ItemUnnamed ItemUnnamed ItemUnnamed ItemUnnamed Item3D: A Three-Dimensional Block CipherThe Complexity of Distinguishing Distributions (Invited Talk)Reflection Cryptanalysis of Some CiphersA Differential-Linear Attack on 12-Round SerpentImproved differential-linear attacks with applications to ARX ciphersSide channel cryptanalysis of product ciphersOn the Role of Key Schedules in Attacks on Iterated CiphersA Bird’s-Eye View of Modern Symmetric Cryptography from Combinatorial DesignsPseudorandom Functions: Three Decades LaterA Super-Set of Patterson-Wiedemann Functions – Upper Bounds and Possible NonlinearitiesHeuristic algorithm for obtaining permutations with given cryptographic properties using a generalized constructionOn known constructions of APN and AB functions and their relation to each otherAlgorithm 959Feedback linearly extended discrete functionsCryptographic Analysis of All 4 × 4-Bit S-Boxes




This page was built for publication: