Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
ICEBERG - MaRDI portal

ICEBERG

From MaRDI portal
Software:25158



swMATH13243MaRDI QIDQ25158


No author found.





Related Items (21)

Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functionsCryptographic Analysis of All 4 × 4-Bit S-BoxesLinear Cryptanalysis of Reduced-Round ICEBERGFast software encryption. 11th international workshop, FSE 2004, Delhi, India, February 5--7, 2004. Revised papers.SEA: A Scalable Encryption Algorithm for Small Embedded ApplicationsCryptanalysis of an involutional block cipher using cellular automataCryptographic Hardware and Embedded Systems - CHES 2004Cryptanalysis of Reduced-Round SIMON32 and SIMON48Information security practice and experience. 8th international conference, ISPEC 2012, Hangzhou, China, April 9--12, 2012. ProceedingsProgress in cryptology -- AFRICACRYPT 2012. 5th international conference on cryptology in Africa, Ifrane, Morocco, July 10--12, 2012. ProceedingsAn algorithm for finding the minimum degree of a polynomial over a finite field for a function over a vector space depending on the choice of an irreducible polynomialKey alternating ciphers based on involutionsReflection ciphersSelected Areas in CryptographyTowards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy ViewpointUnnamed ItemPerfect nonlinear functions and cryptographyReflection cryptanalysis of PRINCE-like ciphersConstruction of Lightweight S-Boxes Using Feistel and MISTY StructuresNew classes of $8$-bit permutations based on a butterfly structureПостроение подстановок пространства $V_{2m}$ с использованием $(2m,m)$-функций


This page was built for software: ICEBERG