Kuznyechik
From MaRDI portal
Cited in
(28)- Constructing 8-bit permutations, 8-bit involutions and 8-bit orthomorphisms with almost optimal cryptographic parameters
- Practical significance of security bounds for standardized internally re-keyed block cipher modes
- Cryptographic properties of small bijective S-boxes with respect to modular addition
- Layers of the graph of \(k\)-fold iteration of the uniform random mapping
- Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem
- Multiset structural attack on generalized Feistel networks
- Scream
- ICEBERG
- Whirlpool
- MacGuffin
- Serpent
- CRYPTON
- MISTY
- Bel-T
- sboxgates
- Streebog
- Invariant subspaces in SPN block cipher
- Слои в графе композиции независимых равновероятных случайных отображений
- Построение подстановок пространства $V_{2m}$ с использованием $(2m,m)$-функций
- Об алгебраической степени и дифференциальной равномерности подстановок пространства $V_{2m}$, построенных с использованием $(2m,m)$-функций
- Fault analysis of Kuznyechik
- A compact bit-sliced representation of Kuznyechik S-box
- A further study of quadratic APN permutations in dimension nine
- On images and pre-images in a graph of the composition of independent uniform random mappings
- On the properties of the CTR encryption mode of Magma and Kuznyechik block ciphers with re-keying method based on CryptoPro key meshing
- New classes of 8-bit permutations based on a butterfly structure
- Distribution of the length of aperiodicity segment in the graph of independent uniform random mappings composition
- Out of Non-linearity: Search Impossible Differentials by the Bitwise Characteristic Matrix
This page was built for software: Kuznyechik