Provable security against a differential attack

From MaRDI portal
Publication:1842516

DOI10.1007/BF00204800zbMath0817.94016OpenAlexW2027325533WikidataQ29030766 ScholiaQ29030766MaRDI QIDQ1842516

Kaisa Nyberg, Lars R. Knudsen

Publication date: 8 August 1995

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/bf00204800




Related Items (39)

Invariants for EA- and CCZ-equivalence of APN and AB functionsBoolean polynomials, BDDs and CRHS equations -- connecting the dots with CryptaPathSecurity evaluation of MISTY structure with SPN round functionThe \(t\)-wise independence of substitution-permutation networksCharacterization of almost perfect nonlinear functions in terms of subfunctionsIntegral Cryptanalysis on Full MISTY1Counting active S-boxes is not enoughTransparency order of \((n, m)\)-functions -- its further characterization and applicationsAnalysis of minimum numbers of linearly active \(S\)-boxes of a class of generalized Feistel block ciphersSolving \(X^{2^{3n} + 2^{2n} + 2^n - 1} + (X + 1)^{2^{3n} + 2^{2n} + 2^n - 1} = b\) in \(\mathbb{F}_{2^{4 n}}\) and an alternative proof of a conjecture on the differential spectrum of the related monomial functionsIntegral cryptanalysis on full MISTY1More differentially 6-uniform power functionsConstructing infinite families of low differential uniformity (\(n,m\))-functions with \(m>n/2\)A new construction of differentially 4-uniform \((n,n-1)\)-functionsMiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative ComplexityOn perfect linear approximations and differentials over two-round SPNsStrong and tight security guarantees against integral distinguishersMind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitionsConstructions with high algebraic degree of differentially 4-uniform \((n, n - 1)\)-functions and differentially 8-uniform \((n, n - 2)\)-functionsA Meet-in-the-Middle Attack on 8-Round AESRigid commutators and a normalizer chainThe interpolation attack on block ciphersImproving linear cryptanalysis of LOKI91 by probabilistic counting methodHigher Order Differential Attack of a CAST CipherCS-CipherBit-Based Division Property and Application to Simon FamilyA novel keyed parallel hashing scheme based on a new chaotic systemOn derivatives of polynomials over finite fields through integrationLuby-Rackoff revisited: on the use of permutations as inner functions of a Feistel schemeDistinguishing properties and applications of higher order derivatives of Boolean functionsPerfect nonlinear functions and cryptographyConstruction of Lightweight S-Boxes Using Feistel and MISTY StructuresСпектрально-линейный и спектрально-дифференциальный методы построения S-бокcов с близкими к оптимальным значениями криптографических параметров\textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fieldsBagua: a NFSR-based stream cipher constructed following confusion and diffusion principlesPen and Paper Arguments for SIMON and SIMON-like DesignsThe State of the Art on the Conjecture of Exceptional APN FunctionsNew criteria for linear maps in AES-like ciphersUnnamed Item



Cites Work


This page was built for publication: Provable security against a differential attack