Fast Software Encryption
From MaRDI portal
Publication:5473605
DOI10.1007/b137506zbMath1140.94368OpenAlexW4214882369WikidataQ28000487 ScholiaQ28000487MaRDI QIDQ5473605
Publication date: 22 June 2006
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b137506
Related Items
On characterization of transparency order for \((n, m)\)-functions ⋮ Homomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more data ⋮ Transparency order of \((n, m)\)-functions -- its further characterization and applications ⋮ CAR30: a new scalable stream cipher with rule 30 ⋮ Results on the Gowers U2 Norm of Generalized Boolean Functions ⋮ Further research results on confusion coefficient of Boolean functions ⋮ Polar differential power attacks and evaluation ⋮ On the confusion coefficient of Boolean functions ⋮ Redefining the transparency order ⋮ On two DES implementations secure against differential power analysis in smart-cards ⋮ A Theoretical Study of Kolmogorov-Smirnov Distinguishers ⋮ Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice ⋮ Results on symmetric S-boxes constructed by concatenation of RSSBs ⋮ Transparency order for Boolean functions: analysis and construction ⋮ A note on the signal-to-noise ratio of \((n, m)\)-functions ⋮ Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle ⋮ A Search Strategy to Optimize the Affine Variant Properties of S-Boxes