Pages that link to "Item:Q1842516"
From MaRDI portal
The following pages link to Provable security against a differential attack (Q1842516):
Displayed 39 items.
- Characterization of almost perfect nonlinear functions in terms of subfunctions (Q314219) (← links)
- More differentially 6-uniform power functions (Q398956) (← links)
- A novel keyed parallel hashing scheme based on a new chaotic system (Q508257) (← links)
- On derivatives of polynomials over finite fields through integration (Q516828) (← links)
- Distinguishing properties and applications of higher order derivatives of Boolean functions (Q726339) (← links)
- Boolean polynomials, BDDs and CRHS equations -- connecting the dots with CryptaPath (Q832343) (← links)
- A new construction of differentially 4-uniform \((n,n-1)\)-functions (Q895007) (← links)
- New criteria for linear maps in AES-like ciphers (Q1032487) (← links)
- Constructions with high algebraic degree of differentially 4-uniform \((n, n - 1)\)-functions and differentially 8-uniform \((n, n - 2)\)-functions (Q1704202) (← links)
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields (Q2056720) (← links)
- Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles (Q2057178) (← links)
- Invariants for EA- and CCZ-equivalence of APN and AB functions (Q2121023) (← links)
- The \(t\)-wise independence of substitution-permutation networks (Q2139644) (← links)
- Counting active S-boxes is not enough (Q2152037) (← links)
- Transparency order of \((n, m)\)-functions -- its further characterization and applications (Q2154041) (← links)
- Solving \(X^{2^{3n} + 2^{2n} + 2^n - 1} + (X + 1)^{2^{3n} + 2^{2n} + 2^n - 1} = b\) in \(\mathbb{F}_{2^{4 n}}\) and an alternative proof of a conjecture on the differential spectrum of the related monomial functions (Q2168944) (← links)
- Rigid commutators and a normalizer chain (Q2232810) (← links)
- Analysis of minimum numbers of linearly active \(S\)-boxes of a class of generalized Feistel block ciphers (Q2391921) (← links)
- Integral cryptanalysis on full MISTY1 (Q2408592) (← links)
- Constructing infinite families of low differential uniformity (\(n,m\))-functions with \(m>n/2\) (Q2420471) (← links)
- Luby-Rackoff revisited: on the use of permutations as inner functions of a Feistel scheme (Q2491299) (← links)
- Perfect nonlinear functions and cryptography (Q2512886) (← links)
- Security evaluation of MISTY structure with SPN round function (Q2629406) (← links)
- Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions (Q2692350) (← links)
- Construction of Lightweight S-Boxes Using Feistel and MISTY Structures (Q2807223) (← links)
- Pen and Paper Arguments for SIMON and SIMON-like Designs (Q2827732) (← links)
- MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity (Q2958119) (← links)
- Спектрально-линейный и спектрально-дифференциальный методы построения S-бокcов с близкими к оптимальным значениями криптографических пар (Q3381882) (← links)
- Integral Cryptanalysis on Full MISTY1 (Q3457121) (← links)
- A Meet-in-the-Middle Attack on 8-Round AES (Q3525664) (← links)
- The State of the Art on the Conjecture of Exceptional APN Functions (Q4639087) (← links)
- The interpolation attack on block ciphers (Q4639324) (← links)
- Improving linear cryptanalysis of LOKI91 by probabilistic counting method (Q4639334) (← links)
- Higher Order Differential Attack of a CAST Cipher (Q4639437) (← links)
- CS-Cipher (Q4639449) (← links)
- Bit-Based Division Property and Application to Simon Family (Q4639488) (← links)
- (Q5150547) (← links)
- On perfect linear approximations and differentials over two-round SPNs (Q6145946) (← links)
- Strong and tight security guarantees against integral distinguishers (Q6157498) (← links)