scientific article; zbMATH DE number 708833

From MaRDI portal
Revision as of 20:34, 6 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4318725

zbMath0824.68037MaRDI QIDQ4318725

Kaisa Nyberg, Lars R. Knudsen

Publication date: 9 January 1995


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (65)

Trims and extensions of quadratic APN functionsNon-monomial permutations with differential uniformity sixOn \((-1)\)-differential uniformity of ternary APN power functionsCan a differential attack work for an arbitrarily large number of rounds?Provable security for 13 round Skipjack-like structureA further study of quadratic APN permutations in dimension nineTowards tight security of cascaded LRW2The design of composite permutations with applications to DES-like S-boxesCounting active S-boxes is not enoughAnalysis of minimum numbers of linearly active \(S\)-boxes of a class of generalized Feistel block ciphersA direct proof of APN-ness of the Kasami functionsFurther study of planar functions in characteristic twoIf a generalised butterfly is APN then it operates on 6 bitsImproved Top-Down Techniques in Differential CryptanalysisLow-degree planar monomials in characteristic twoMore differentially 6-uniform power functionsA matrix approach for constructing quadratic APN functionsOn the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomialsCharacteristics of nonlinearity of vectorial functions over finite fieldsA further study on bridge structures and constructing bijective S-boxes for low-latency maskingOn the differential and linear efficiency of balanced Feistel networksA new construction of differentially 4-uniform \((n,n-1)\)-functionsOn APN functions whose graphs are maximal Sidon setsNon-existence of one-byte active impossible differentials for 5-round AES in the master-key settingCharacterizations of a class of planar functions over finite fieldsOn a generalization of planar functionsRevisiting some results on APN and algebraic immune functionsDecomposition of Dillon's APN permutation with efficient hardware implementationRelated-key differential cryptanalysis of GMiMC used in post-quantum signaturesAlmost perfect and planar functionsMore constructions of APN and differentially 4-uniform functions by concatenationGeneralized almost perfect nonlinear binomials and trinomials over fields of prime-square orderTwo notions of differential equivalence on SboxesOn the classification of exceptional planar functions over \(\mathbb F_p\)Planar functions over fields of characteristic twoA practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephonyOn CCZ-equivalence, extended-affine equivalence, and function twistingNew block encryption algorithm MISTYTHE LINEAR SPECTRUM OF QUADRATIC APN FUNCTIONSNew pseudo-planar binomials in characteristic two and related schemesImpossible differential cryptanalysis using matrix methodSome planar monomials in characteristic 2Multi-objective optimisation of bijective S-boxesThe resistance of PRESENT-80 against related-key differential attacksLinear provable security for a class of unbalanced Feistel networkOn 3-to-1 and Power APN S-BoxesPerfect nonlinear functions and cryptographyО матрицах переходов разностей при использовании некоторых модулярных группО приближении дискретных функций линейными функциямиРазбиения на биграммах и марковость алгоритмов блочного шифрования$\otimes_{\mathbf{W}}$-марковость XSL-алгоритмов блочного шифрования, связанная со свойствами слоев раундовой функцииХарактеризация отображений через свойство неизометричностиA family of planar binomials in characteristic 2Low-degree planar polynomials over finite fields of characteristic twoXPX: Generalized Tweakable Even-Mansour with Improved Security GuaranteesUnnamed ItemUnnamed ItemExceptional crooked functionsA class of functions and their application in constructing semi-biplanes and association schemesPlanar functions and perfect nonlinear monomials over finite fieldsImproving the strict avalanche characteristics of cryptographic functionsExceptional planar polynomialsConstructing functions with low differential uniformityPlanar polynomials arising from linearized polynomialsOn a generalization of substitution-permutation networks: the HADES design strategy







This page was built for publication: