The following pages link to (Q4934705):
Displaying 50 items.
- Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties (Q269570) (← links)
- Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions (Q269576) (← links)
- Walsh transforms and cryptographic applications in bias computing (Q276565) (← links)
- New explicit constructions of differentially 4-uniform permutations via special partitions of \(\mathbb{F}_{2^{2 k}}\) (Q285462) (← links)
- Another look at normal approximations in cryptanalysis (Q293721) (← links)
- Improving algorithm 2 in multidimensional (zero-correlation) linear cryptanalysis using \(\chi^2\)-method (Q329196) (← links)
- Evolutionary cryptography against multidimensional linear cryptanalysis (Q351026) (← links)
- On cross-correlation indicators of an S-box (Q352094) (← links)
- Practical security against linear cryptanalysis for SMS4-like ciphers with SP round function (Q362309) (← links)
- Measuring bias in cyclic random walks (Q387426) (← links)
- On the relationships between perfect nonlinear functions and universal hash families (Q391979) (← links)
- Towards the optimality of Feistel ciphers with substitution-permutation functions (Q398983) (← links)
- Zero-correlation linear cryptanalysis of reduced-round LBlock (Q398985) (← links)
- On the differential and linear efficiency of balanced Feistel networks (Q407580) (← links)
- Binomial differentially 4 uniform permutations with high nonlinearity (Q413555) (← links)
- On construction of involutory MDS matrices from Vandermonde matrices in \(\mathrm{GF}(2^q)\) (Q438877) (← links)
- An upper bound for the linearity of exponential Welch-Costas functions (Q439098) (← links)
- On semi-bent functions with Niho exponents (Q439849) (← links)
- Differential fault analysis on block cipher SEED (Q445349) (← links)
- Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time (Q451122) (← links)
- On multiple output bent functions (Q456135) (← links)
- AKF: a key alternating Feistel scheme for lightweight cipher designs (Q477688) (← links)
- A generalized birthday approach for efficiently finding linear relations in \(\ell\)-sequences (Q488250) (← links)
- A methodology for differential-linear cryptanalysis and its applications (Q499655) (← links)
- Differentially 4-uniform bijections by permuting the inverse function (Q499660) (← links)
- On the nonlinearity of S-boxes and linear codes (Q507951) (← links)
- New differentially 4-uniform permutations by modifying the inverse function on subfields (Q507952) (← links)
- Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity (Q510482) (← links)
- A new counting method to bound the number of active S-boxes in Rijndael and 3D (Q522208) (← links)
- The (related-key) impossible boomerang attack and its application to the AES block cipher (Q543423) (← links)
- DES with any reduced masked rounds is not secure against side-channel attacks (Q604102) (← links)
- Some remarks on the TKIP key mixing function of IEEE 802.11i (Q615203) (← links)
- Cryptographic properties and application of a generalized unbalanced Feistel network structure (Q662179) (← links)
- Non abelian bent functions (Q662196) (← links)
- Generic attacks with standard deviation analysis on a-Feistel schemes (Q680923) (← links)
- Results on rotation-symmetric S-boxes (Q712704) (← links)
- On quadratic approximations in block ciphers (Q734264) (← links)
- Further properties of several classes of Boolean functions with optimum algebraic immunity (Q735033) (← links)
- Investigation of some cryptographic properties of the \(8 \times 8\) S-boxes created by quasigroups (Q821312) (← links)
- Zero-correlation linear cryptanalysis with equal treatment for plaintexts and tweakeys (Q826250) (← links)
- A framework to optimize implementations of matrices (Q826298) (← links)
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations (Q831640) (← links)
- Weak-key distinguishers for AES (Q832335) (← links)
- WARP: revisiting GFN for lightweight 128-bit block cipher (Q832383) (← links)
- Nonlinearities of S-boxes (Q865386) (← links)
- Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers (Q870119) (← links)
- On the degree of homogeneous bent functions (Q875602) (← links)
- The DBlock family of block ciphers (Q893839) (← links)
- A new construction of differentially 4-uniform \((n,n-1)\)-functions (Q895007) (← links)
- A construction of bent functions of \(n+2\) variables from a bent function of \(n\) variables and its cyclic shifts (Q895958) (← links)