Walsh transforms and cryptographic applications in bias computing (Q276565): Difference between revisions

From MaRDI portal
RedirectionBot (talk | contribs)
Removed claim: author (P16): Item:Q1304978
ReferenceBot (talk | contribs)
Changed an Item
 
(6 intermediate revisions by 6 users not shown)
Property / author
 
Property / author: Yvo G. Desmedt / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: eSTREAM / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s12095-015-0155-4 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2140721899 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374940 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4365754 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Bent and Semi-Bent Quadratic Boolean Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improving the Time Complexity of Matsui’s Linear Cryptanalysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737246 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Elements of Information Theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bent-function sequences / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5713307 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Linear Distinguishing Attack on Shannon / rank
 
Normal rank
Property / cites work
 
Property / cites work: Partitioning cryptanalysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Sequences, Bent Functions and Jacobsthal Sums / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3418742 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4945367 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3765876 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved algorithms for finding low-weight polynomial multiples in \(\mathbb F_2[x]\) and some cryptographic applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bias Analysis of a Certain Problem with Applications to E0 and Shannon Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of an E0-like combiner with memory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4934705 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Computation of Large Distributions and Its Cryptographic Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast correlation attacks on certain stream ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5202622 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Correlation properties of combiners with memory in stream ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Correlation Attacks: Methods and Countermeasures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4718481 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Perfect nonlinear S-boxes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4036866 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Application of Walsh Transform to Statistical Analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: On ``bent'' functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4409125 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Digital picture processing. An introduction. Transl. from the Russian / rank
 
Normal rank

Latest revision as of 22:42, 11 July 2024

scientific article
Language Label Description Also known as
English
Walsh transforms and cryptographic applications in bias computing
scientific article

    Statements

    Walsh transforms and cryptographic applications in bias computing (English)
    0 references
    0 references
    0 references
    4 May 2016
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    Walsh transform
    0 references
    linear cryptanalysis
    0 references
    bias analysis
    0 references
    maximum entropy principle
    0 references
    piling-up lemma
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references