The following pages link to (Q4484903):
Displaying 49 items.
- Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties (Q269570) (← links)
- Matrix representations of vectorial Boolean functions and eigenanalysis (Q301638) (← links)
- Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity (Q510482) (← links)
- Towards a spectral approach for the design of self-synchronizing stream ciphers (Q662190) (← links)
- Investigation of some cryptographic properties of the \(8 \times 8\) S-boxes created by quasigroups (Q821312) (← links)
- Correlations whose squares are perspectivities (Q909231) (← links)
- Differential and linear cryptanalysis for 2-round spns (Q1014440) (← links)
- A spherical representation of a correlation matrix (Q1126402) (← links)
- Correlation dimension (Q1284781) (← links)
- Correlation measures (Q1806359) (← links)
- Generalization of Matsui's Algorithm 1 to linear hull for key-alternating block ciphers (Q1934241) (← links)
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields (Q2056720) (← links)
- Linear cryptanalysis of FF3-1 and FEA (Q2120066) (← links)
- Computing expected differential probability of (truncated) differentials and expected linear potential of (multidimensional) linear hulls in SPN block ciphers (Q2152038) (← links)
- Compatible matrices of Spearman's rank correlation (Q2322625) (← links)
- Linear hulls with correlation zero and linear cryptanalysis of block ciphers (Q2439738) (← links)
- Literature survey on nonlinear components and chaotic nonlinear components of block ciphers (Q2441984) (← links)
- Cryptanalysis of masked ciphers: a not so random idea (Q2692369) (← links)
- Wide Trail Design Strategy for Binary MixColumns (Q2822689) (← links)
- Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey (Q2822690) (← links)
- Statistical corrections of invalid correlation matrices (Q2868869) (← links)
- On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2 (Q2946869) (← links)
- Towards Understanding the Known-Key Security of Block Ciphers (Q2946886) (← links)
- Statistical rehabilitation of improper correlation matrices (Q3088326) (← links)
- On Linear Hulls and Trails (Q3179489) (← links)
- The permutation group insight on the diffusion property of linear mappings (Q3382018) (← links)
- Linear and differential cryptanalysis: Another viewpoint (Q3383111) (← links)
- О линейном и разностном криптоанализе AES-подобных алгоритмов шифрования (Q3383125) (← links)
- Toward the True Random Cipher: On Expected Linear Probability Values for SPNS with Randomly Selected S-Boxes (Q3448746) (← links)
- New Applications of Differential Bounds of the SDS Structure (Q3540157) (← links)
- An analysis of correlation matrices: Equal correlations (Q3681772) (← links)
- (Q3716086) (← links)
- Correspondence Analysis of Square Asymmetric Matrices (Q4512432) (← links)
- A note on adjusting correlation matrices (Q4541610) (← links)
- A New Parametrization of Correlation Matrices (Q5020500) (← links)
- The shape of partial correlation matrices (Q5079819) (← links)
- MATRIX FORMULA FOR THE SPECTRUM OF OUTPUT DISTRIBUTION OF BLOCK CIPHER SCHEME AND STATISTICAL CRITERION BASED ON THIS FORMULA (Q5150735) (← links)
- About Relational Correlations (Q5302549) (← links)
- (Q5461464) (← links)
- Block cipher invariants as eigenvectors of correlation matrices (Q5918867) (← links)
- Correlation theorems in cryptanalysis (Q5939243) (← links)
- Visualization of a set of parameters characterized by their correlation matrix. (Q5940871) (← links)
- Quantum speed-up for multidimensional (zero correlation) linear distinguishers (Q6595817) (← links)
- On a relationship between linear and differential characteristics of binary vector spaces mappings and diffusion characteristics over blocks of imprimitivity systems of translation group of the binary vector space (Q6599819) (← links)
- Methods of linear and differential relations in cryptography (Q6599820) (← links)
- A low-randomness second-order masked AES (Q6618584) (← links)
- Utilizing FWT in linear cryptanalysis of block ciphers with various structures (Q6632064) (← links)
- Improving linear key recovery attacks using Walsh spectrum puncturing (Q6636389) (← links)
- Propagation properties of a non-linear mapping based on squaring in odd characteristic (Q6643243) (← links)