On the Multi-output Filtering Model and Its Applications
From MaRDI portal
Publication:5739040
DOI10.1007/978-3-319-55589-8_18zbMath1365.94465OpenAlexW2604780902MaRDI QIDQ5739040
Guang Gong, Teng Wu, Yin Tan, Kalikinkar Mandal
Publication date: 1 June 2017
Published in: Codes, Cryptology and Information Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-55589-8_18
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Probabilistic encryption
- Analysis and design of stream ciphers
- Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials
- Rotational Cryptanalysis of Round-Reduced Keccak
- Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256
- Practical Analysis of Reduced-Round Keccak
- Integral Cryptanalysis on Full MISTY1
- PRESENT: An Ultra-Lightweight Block Cipher
- PRINTcipher: A Block Cipher for IC-Printing
- Cube Attacks on Tweakable Black Box Polynomials
- An analysis of the structure and complexity of nonlinear binary sequence generators
- On the expected value of the linear complexity and the k-error linear complexity of periodic sequences
- Unaligned Rebound Attack: Application to Keccak
- Differential Propagation Analysis of Keccak
- New Attacks on Keccak-224 and Keccak-256
- Keccak
- A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
- On the Multi-output Filtering Model and Its Applications
This page was built for publication: On the Multi-output Filtering Model and Its Applications