scientific article; zbMATH DE number 5050436
From MaRDI portal
zbMath1130.68047MaRDI QIDQ5485136
Matthew J. B. Robshaw, Carlos Cid, Sean Murphy
Publication date: 29 August 2006
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Symbolic computation and algebraic computation (68W30) Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Gröbner bases; other bases for ideals and modules (e.g., Janet and border bases) (13P10) Research exposition (monographs, survey articles) pertaining to computer science (68-02)
Related Items
Creation of S-box based on a hierarchy of Julia sets: image encryption approach, A framework to optimize implementations of matrices, Weak-key distinguishers for AES, MixColumns Coefficient Property and Security of the AES with A Secret S-Box, Implicit Quadratic Property of Differentially 4-Uniform Permutations, Impossible differential cryptanalysis of advanced encryption standard, Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures, Improved heuristics for low-latency implementations of linear layers, FUTURE: a lightweight block cipher using an optimal diffusion matrix, Truncated differential properties of the diagonal set of inputs for 5-round AES, Simpira v2: A Family of Efficient Permutations Using the AES Round Function, Obtaining and solving systems of equations in key variables only for the small variants of AES, Three input exclusive-or gate support for Boyar-Peralta's algorithm, Improved truncated differential distinguishers of AES with concrete S-box, Algebraic Attacks on the Courtois Toy Cipher, Characterizations and constructions of triple-cycle permutations of the form \(x^rh(x^s)\), Penalized semidefinite programming for quadratically-constrained quadratic optimization, Group theoretic properties of Rijndael-like ciphers, Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection
Uses Software