Provable security against a differential attack
From MaRDI portal
Publication:1842516
DOI10.1007/BF00204800zbMath0817.94016OpenAlexW2027325533WikidataQ29030766 ScholiaQ29030766MaRDI QIDQ1842516
Publication date: 8 August 1995
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/bf00204800
differential cryptanalysisdata encryption standardMarkov ciphersalmost perfect nonlinear permutationsDES-like cipher
Related Items (39)
Invariants for EA- and CCZ-equivalence of APN and AB functions ⋮ Boolean polynomials, BDDs and CRHS equations -- connecting the dots with CryptaPath ⋮ Security evaluation of MISTY structure with SPN round function ⋮ The \(t\)-wise independence of substitution-permutation networks ⋮ Characterization of almost perfect nonlinear functions in terms of subfunctions ⋮ Integral Cryptanalysis on Full MISTY1 ⋮ Counting active S-boxes is not enough ⋮ Transparency order of \((n, m)\)-functions -- its further characterization and applications ⋮ Analysis of minimum numbers of linearly active \(S\)-boxes of a class of generalized Feistel block ciphers ⋮ Solving \(X^{2^{3n} + 2^{2n} + 2^n - 1} + (X + 1)^{2^{3n} + 2^{2n} + 2^n - 1} = b\) in \(\mathbb{F}_{2^{4 n}}\) and an alternative proof of a conjecture on the differential spectrum of the related monomial functions ⋮ Integral cryptanalysis on full MISTY1 ⋮ More differentially 6-uniform power functions ⋮ Constructing infinite families of low differential uniformity (\(n,m\))-functions with \(m>n/2\) ⋮ A new construction of differentially 4-uniform \((n,n-1)\)-functions ⋮ MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity ⋮ On perfect linear approximations and differentials over two-round SPNs ⋮ Strong and tight security guarantees against integral distinguishers ⋮ Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions ⋮ Constructions with high algebraic degree of differentially 4-uniform \((n, n - 1)\)-functions and differentially 8-uniform \((n, n - 2)\)-functions ⋮ A Meet-in-the-Middle Attack on 8-Round AES ⋮ Rigid commutators and a normalizer chain ⋮ The interpolation attack on block ciphers ⋮ Improving linear cryptanalysis of LOKI91 by probabilistic counting method ⋮ Higher Order Differential Attack of a CAST Cipher ⋮ CS-Cipher ⋮ Bit-Based Division Property and Application to Simon Family ⋮ A novel keyed parallel hashing scheme based on a new chaotic system ⋮ On derivatives of polynomials over finite fields through integration ⋮ Luby-Rackoff revisited: on the use of permutations as inner functions of a Feistel scheme ⋮ Distinguishing properties and applications of higher order derivatives of Boolean functions ⋮ Perfect nonlinear functions and cryptography ⋮ Construction of Lightweight S-Boxes Using Feistel and MISTY Structures ⋮ Спектрально-линейный и спектрально-дифференциальный методы построения S-бокcов с близкими к оптимальным значениями криптографических параметров ⋮ \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields ⋮ Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles ⋮ Pen and Paper Arguments for SIMON and SIMON-like Designs ⋮ The State of the Art on the Conjecture of Exceptional APN Functions ⋮ New criteria for linear maps in AES-like ciphers ⋮ Unnamed Item
Cites Work
This page was built for publication: Provable security against a differential attack