Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1406763 - MaRDI portal

scientific article; zbMATH DE number 1406763

From MaRDI portal
Publication:4940676

zbMath0939.94524MaRDI QIDQ4940676

Martin Edward Hellman, Susan K. Langford

Publication date: 1 March 2000


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (46)

Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipherDifferential-linear cryptanalysis from an algebraic perspectiveMultiple differential-zero correlation linear cryptanalysis of reduced-round CAST-256Amplifying Side-Channel Attacks with Techniques from Block Cipher CryptanalysisSEA: A Scalable Encryption Algorithm for Small Embedded ApplicationsAutocorrelations of vectorial Boolean functionsDifferential-linear cryptanalysis of the lightweight crytographic algorithm KNOTCounting active S-boxes is not enoughNew attacks from old distinguishers improved attacks on serpentSurvey on recent trends towards generalized differential and boomerang uniformitiesCapability of evolutionary cryptosystems against differential cryptanalysisRevamped differential-linear cryptanalysis on reduced round ChaChaDifferential-linear cryptanalysis revisitedVectorial Boolean functions with very low differential-linear uniformity using Maiorana-McFarland type constructionRotational-linear attack: a new framework of cryptanalysis on ARX ciphers with applications to ChaskeyRotational-XOR differential rectangle cryptanalysis on \textsc{Simon}-like ciphersRotational differential-linear cryptanalysis revisitedFully automated differential-linear attacks against ARX ciphersNNBits: bit profiling with a deep learning ensemble based distinguisherEfficient detection of high probability statistical properties of cryptosystems via surrogate differentiationA theoretical analysis of generalized invariants of bijective S-boxesLatin dances reloaded: improved cryptanalysis against Salsa and ChaCha, and the proposal of ForróSimpira v2: A Family of Efficient Permutations Using the AES Round FunctionLatin dances reloaded: improved cryptanalysis against Salsa and ChaCha, and the proposal of ForróDifferential meet-in-the-middle cryptanalysisMoving a step of ChaCha in syncopated rhythmAutomated key recovery attacks on round-reduced OrthrosOptimising linear key recovery attacks with affine Walsh transform pruningAccurate estimates of the data complexity and success probability for various cryptanalysesRevisiting iterated attacks in the context of decorrelation theoryA methodology for differential-linear cryptanalysis and its applicationsConstruction of balanced vectorial Boolean functions with almost optimal nonlinearity and very low differential-linear uniformityOn probability of success in linear and differential cryptanalysisThe (related-key) impossible boomerang attack and its application to the AES block cipherDifferential-Multiple Linear CryptanalysisCryptanalysis of AsconRelated-Key Differential-Linear Attacks on Reduced AES-192Improved differential-linear attacks with applications to ARX ciphersImproved linear approximations to ARX ciphers and attacks against ChaChaRotational cryptanalysis from a differential-linear perspective. Practical distinguishers for round-reduced \texttt{FRIET}, \texttt{Xoodoo}, and \texttt{Alzette}A deeper look at machine learning-based cryptanalysisThe Cryptanalysis of Reduced-Round SMS4New Related-Key Boomerang Attacks on AESA Differential-Linear Attack on 12-Round SerpentImproved differential-linear attack with application to round-reduced Speck32/64Improved differential-linear attacks with applications to ARX ciphers




This page was built for publication: