Publication | Date of Publication | Type |
---|
On the algebraic degree of iterated power functions | 2023-03-17 | Paper |
Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems | 2022-12-07 | Paper |
Recovering or Testing Extended-Affine Equivalence | 2022-10-11 | Paper |
Autocorrelations of vectorial Boolean functions | 2022-06-15 | Paper |
If a generalised butterfly is APN then it operates on 6 bits | 2020-05-12 | Paper |
BISON instantiating the whitened swap-or-not construction | 2020-02-04 | Paper |
DFA on LS-Designs with a Practical Implementation on SCREAM | 2019-09-16 | Paper |
On CCZ-equivalence, extended-affine equivalence, and function twisting | 2019-03-27 | Paper |
Two notions of differential equivalence on Sboxes | 2019-02-20 | Paper |
Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression | 2018-09-14 | Paper |
A Generalisation of Dillon's APN Permutation With the Best Known Differential and Nonlinear Properties for All Fields of Size $2^{4k+2}$ | 2018-06-27 | Paper |
Attacks Against Filter Generators Exploiting Monomial Mappings | 2018-05-09 | Paper |
Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression | 2018-05-09 | Paper |
A new algorithm for finding minimum-weight words in large linear codes | 2018-03-21 | Paper |
Proving resistance against invariant attacks: how to choose the round constants | 2017-11-15 | Paper |
Parity-Check Relations on Combination Generators | 2017-07-12 | Paper |
Differential Properties of ${x\mapsto x^{2^{t}-1}}$ | 2017-07-12 | Paper |
On the Influence of the Algebraic Degree of $F^{-1}$ on the Algebraic Degree of $G \circ F$ | 2017-06-08 | Paper |
Reflection ciphers | 2017-02-10 | Paper |
Another View of the Division Property | 2016-11-30 | Paper |
Extended differential properties of cryptographic functions | 2016-09-02 | Paper |
Related-Key Attack on Full-Round PICARO | 2016-05-19 | Paper |
Construction of Lightweight S-Boxes Using Feistel and MISTY Structures | 2016-05-19 | Paper |
Generalization of Siegenthaler Inequality and Schnorr-Vaudenay Multipermutations | 2015-11-11 | Paper |
On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks | 2015-09-30 | Paper |
Differential Attacks Against SPN: A Thorough Analysis | 2015-09-21 | Paper |
A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox | 2015-09-18 | Paper |
Multiple Differential Cryptanalysis of Round-Reduced PRINCE | 2015-09-18 | Paper |
Construction of t-Resilient Functions over a Finite Alphabet | 2014-08-20 | Paper |
Sieve-in-the-Middle: Improved MITM Attacks | 2013-09-02 | Paper |
Correlation attacks on combination generators | 2013-06-24 | Paper |
PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications | 2013-03-19 | Paper |
Higher-Order Differential Properties of Keccak and Luffa | 2011-07-07 | Paper |
Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256 | 2011-03-15 | Paper |
Differential properties of power functions | 2011-02-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q3062265 | 2011-01-03 | Paper |
Decomposing bent functions | 2008-12-21 | Paper |
Symmetric Boolean Functions | 2008-12-21 | Paper |
On Almost Perfect Nonlinear Functions Over$mmb F_2^n$ | 2008-12-21 | Paper |
A new class of monomial bent functions | 2008-02-06 | Paper |
Coding and Cryptography | 2007-05-02 | Paper |
Construction of bent functions via Niho power functions | 2006-08-04 | Paper |
Finding nonnormal bent functions | 2006-04-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q3374932 | 2006-03-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4665029 | 2005-04-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q4737268 | 2004-08-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4788558 | 2003-05-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q4537990 | 2002-11-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q4941812 | 2002-10-09 | Paper |
On the weight distributions of optimal cosets of the first-order Reed-Muller codes | 2002-08-04 | Paper |
On cryptographic properties of the cosets of R(1, m) | 2002-08-04 | Paper |
Binary m-sequences with three-valued crosscorrelation: a proof of Welch's conjecture | 2000-09-07 | Paper |
Correlation-immune and resilient functions over a finite alphabet and their applications in cryptography | 2000-05-22 | Paper |
Weight Divisibility of Cyclic Codes, Highly Nonlinear Functions on F2m, and Crosscorrelation of Maximum-Length Sequences | 2000-03-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q4249266 | 2000-02-15 | Paper |
Couples de suites binaires de longueur maximale ayant une corrélation croisée à trois valeurs: conjecture de Welch | 1999-06-29 | Paper |
A new algorithm for finding minimum-weight words in a linear code: application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511 | 1998-08-10 | Paper |