Key-dependent S-boxes and differential cryptanalysis
From MaRDI portal
Recommendations
- A new representation of S-boxes for algebraic differential cryptanalysis
- Differential Cryptanalysis of Keccak Variants
- Differential cryptanalysis in the fixed-key model
- Fast Software Encryption
- Resistance of balanced s-boxes to linear and differential cryptanalysis
- Differential cryptanalysis of KHF
- Differential cryptanalysis of SipHash
- Conditional differential cryptanalysis for Kreyvium
- Cryptanalysis of PRESENT-like ciphers with secret S-boxes
Cited in
(16)- Slender-set differential cryptanalysis
- Cryptographic properties of modified AES-like S-boxes
- Notions and relations for RKA-secure permutation and function families
- scientific article; zbMATH DE number 1107704 (Why is no real title available?)
- A matrix PRNG with s-box output filtering
- scientific article; zbMATH DE number 5544831 (Why is no real title available?)
- Efficient key-dependent dynamic S-boxes based on permutated elliptic curves
- Differential Cryptanalysis of Keccak Variants
- scientific article; zbMATH DE number 5009213 (Why is no real title available?)
- A new representation of S-boxes for algebraic differential cryptanalysis
- scientific article; zbMATH DE number 7762727 (Why is no real title available?)
- scientific article; zbMATH DE number 1088930 (Why is no real title available?)
- On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks
- Applications of Simon's algorithm in quantum attacks on Feistel variants
- Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience
- Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes
This page was built for publication: Key-dependent S-boxes and differential cryptanalysis
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1866017)