scientific article
From MaRDI portal
Publication:2760977
zbMath1065.94005MaRDI QIDQ2760977
Publication date: 17 December 2001
Full work available at URL: http://link.springer.com/978-3-662-04722-4
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Introductory exposition (textbooks, tutorial papers, etc.) pertaining to computer science (68-01) Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Introductory exposition (textbooks, tutorial papers, etc.) pertaining to information and communication theory (94-01)
Related Items
Very Compact Hardware Implementations of the Blockcipher CLEFIA ⋮ Nimix:An involutary nonlinear vectorial boolean function ⋮ Applications of design theory for the constructions of MDS matrices for lightweight cryptography ⋮ Feistel-inspired scrambling improves the quality of linear congruential generators ⋮ Security evaluation of MISTY structure with SPN round function ⋮ Meet-in-the-middle attacks on 10-round AES-256 ⋮ LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication ⋮ Constructions of S-boxes with uniform sharing ⋮ Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core ⋮ Format Preserving Sets: On Diffusion Layers of Format Preserving Encryption Schemes ⋮ Whirlwind: a new cryptographic hash function ⋮ On the symmetric properties of APN functions ⋮ General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher ⋮ Cryptanalysis of Reduced-Round Whirlwind ⋮ Improving the Biclique Cryptanalysis of AES ⋮ Preventing Fault Attacks Using Fault Randomization with a Case Study on AES ⋮ An efficient signcryption for data access control in cloud computing ⋮ Side-channel cryptographic attacks using pseudo-Boolean optimization ⋮ Secure chaotic communication based on extreme multistability ⋮ On the construction of differentially 4-uniform involutions ⋮ Differential-linear cryptanalysis revisited ⋮ Bicliques with Minimal Data and Time Complexity for AES ⋮ Connecting tweakable and multi-key blockcipher security ⋮ Linear Cryptanalysis of the PP-1 and PP-2 Block Ciphers ⋮ Efficient slide attacks ⋮ Block Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-Bit Embedded Applications ⋮ On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2 ⋮ Security Analysis of PRINCE ⋮ Towards Understanding the Known-Key Security of Block Ciphers ⋮ Higher-Order Side Channel Security and Mask Refreshing ⋮ Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES ⋮ A Framework for Automated Independent-Biclique Cryptanalysis ⋮ AES Smaller Than S-Box ⋮ Differential Attacks Against SPN: A Thorough Analysis ⋮ Codes over $\mathcal{L}(GF(2)^m,GF(2)^m)$, MDS Diffusion Matrices and Cryptographic Applications ⋮ Type-preserving matrices and security of block ciphers ⋮ Chaos based efficient selective image encryption ⋮ On algebraic immunity of trace inverse functions on finite fields of characteristic two ⋮ Constructing infinite families of low differential uniformity (\(n,m\))-functions with \(m>n/2\) ⋮ Simpira v2: A Family of Efficient Permutations Using the AES Round Function ⋮ Efficient and Provable White-Box Primitives ⋮ Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm ⋮ How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers ⋮ Design Strategies for ARX with Provable Bounds: Sparx and LAX ⋮ A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group ⋮ Compositions and parities of complete mappings and of orthomorphisms ⋮ Critique of the related-key attack concept ⋮ On unbalanced feistel networks with contracting MDS diffusion ⋮ Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions ⋮ Beyond birthday bound secure fresh rekeying: application to authenticated encryption ⋮ Tight security analysis of 3-round key-alternating cipher with a single permutation ⋮ Quantum collision attacks on AES-like hashing with low quantum random access memories ⋮ Permutation polynomials with low differential uniformity over finite fields of odd characteristic ⋮ More constructions of \(n\)-cycle permutations ⋮ Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC ⋮ Weak Keys for AEZ, and the External Key Padding Attack ⋮ Internal differential collision attacks on the reduced-round Grøstl-0 hash function ⋮ Linear hulls with correlation zero and linear cryptanalysis of block ciphers ⋮ Literature survey on nonlinear components and chaotic nonlinear components of block ciphers ⋮ Cryptographic properties of modified AES-like S-boxes ⋮ Impossible Differentials of SPN Ciphers ⋮ On computational complexity of impossible differential cryptanalysis ⋮ Committing to Quantum Resistance, Better: A Speed-and-Risk-Configurable Defence for Bitcoin Against a Fast Quantum Computing Attack ⋮ Algebraic Attacks on the Courtois Toy Cipher ⋮ LBlock: A Lightweight Block Cipher ⋮ Analysis of Reduced-SHAvite-3-256 v2 ⋮ Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool ⋮ Affine equivalence in the AES round function ⋮ Multi-objective optimisation of bijective S-boxes ⋮ On some probabilistic approximations for AES-like S-boxes ⋮ Designing against a class of algebraic attacks on symmetric block ciphers ⋮ Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON ⋮ Pragmatism vs. Elegance: Comparing Two Approaches to Simple Power Attacks on AES ⋮ Revisiting key schedule's diffusion in relation with round function's diffusion ⋮ What is the Future of Cryptography? ⋮ Bitsliced High-Performance AES-ECB on GPUs ⋮ Improved single-key attacks on 8-round AES-192 and AES-256 ⋮ Cryptanalysis of Feistel Networks with Secret Round Functions ⋮ Improved Meet-in-the-Middle Distinguisher on Feistel Schemes ⋮ Exploring Energy Efficiency of Lightweight Block Ciphers ⋮ Differential Forgery Attack Against LAC ⋮ Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure ⋮ Scope: On the Side Channel Vulnerability of Releasing Unverified Plaintexts ⋮ Analysis of the CAESAR Candidate Silver ⋮ The Differential Analysis of S-Functions ⋮ Implementation of Symmetric Algorithms on a Synthesizable 8-Bit Microcontroller Targeting Passive RFID Tags ⋮ Tweaking AES ⋮ On the Diffusion of Generalized Feistel Structures Regarding Differential and Linear Cryptanalysis ⋮ Affine Masking against Higher-Order Side Channel Analysis ⋮ Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function ⋮ Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ ⋮ Wide Trail Design Strategy for Binary MixColumns ⋮ Square Attack on 7-Round Kiasu-BC ⋮ Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice ⋮ Experimental Verification of Super-Sbox Analysis — Confirmation of Detailed Attack Complexity ⋮ Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem ⋮ Chaotic Image Encryption of Regions of Interest ⋮ Mars Attacks! Revisited: ⋮ New Insights on AES-Like SPN Ciphers ⋮ Linear and differential cryptanalysis of reduced-round AES ⋮ Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties ⋮ Investigation of some cryptographic properties of the \(8 \times 8\) S-boxes created by quasigroups ⋮ Involutory-multiple-lightweight MDS matrices based on Cauchy-type matrices ⋮ A framework to optimize implementations of matrices ⋮ Non-monomial permutations with differential uniformity six ⋮ On the resilience of Even-Mansour to invariant permutations ⋮ On hidden sums compatible with a given block cipher diffusion layer ⋮ Weak-key distinguishers for AES ⋮ Improved (related-key) differential cryptanalysis on GIFT ⋮ On modes of operations of a block cipher for authentication and authenticated encryption ⋮ Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour ⋮ On some block ciphers and imprimitive groups ⋮ Characterization of almost perfect nonlinear functions in terms of subfunctions ⋮ A dynamic prime number based efficient security mechanism for big sensing data streams ⋮ Double image multi-encryption algorithm based on fractional chaotic time series ⋮ On the complexity of parallel algorithms for computing inverses in \(\text{GF}(2^m)\) with \(m\) prime ⋮ Upper bound of the length of truncated impossible differentials for AES ⋮ New secure partial encryption method for medical images using graph coloring problem ⋮ On cross-correlation indicators of an S-box ⋮ Security-aware optimization for ubiquitous computing systems with SEAT graph approach ⋮ Bent and permutational properties of Budaghyan-Carlet hexanomials ⋮ New statistical randomness tests based on length of runs ⋮ New field of cryptography: DNA cryptography ⋮ Color image encryption based on one-time keys and robust chaotic maps ⋮ DES with any reduced masked rounds is not secure against side-channel attacks ⋮ Structural cryptanalysis of SASAS ⋮ Open problems in hash function security ⋮ Some remarks on the TKIP key mixing function of IEEE 802.11i ⋮ A matrix approach for constructing quadratic APN functions ⋮ Towards the optimality of Feistel ciphers with substitution-permutation functions ⋮ Generalized Feistel networks revisited ⋮ Generalization of Matsui's Algorithm 1 to linear hull for key-alternating block ciphers ⋮ Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications ⋮ The DBlock family of block ciphers ⋮ On the differential and linear efficiency of balanced Feistel networks ⋮ A new construction of differentially 4-uniform \((n,n-1)\)-functions ⋮ Collision attack on \({\mathtt Grindahl}\) ⋮ Analysis of \(3\)-line generalized Feistel networks with double SD-functions ⋮ On the construction of hardware-friendly \(4\times4\) and \(5\times5\) S-boxes ⋮ All the AES you need on Cortex-M3 and M4 ⋮ New differential bounds and division property of Lilliput: block cipher with extended generalized Feistel network ⋮ An efficient affine equivalence algorithm for multiple S-boxes and a structured affine layer ⋮ A survey of some applications of finite fields ⋮ Almost perfect and planar functions ⋮ Cryptanalysis of the stream cipher LEX ⋮ Multiplicative complexity of vector valued Boolean functions ⋮ The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers ⋮ On construction of involutory MDS matrices from Vandermonde matrices in \(\mathrm{GF}(2^q)\) ⋮ Two improved multiple-differential collision attacks ⋮ On the construction of \(20 \times 20\) and \(2 4 \times 24\) binary matrices with good implementation properties for lightweight block ciphers and hash functions ⋮ Wave-shaped round functions and primitive groups ⋮ Variants of the AES key schedule for better truncated differential bounds ⋮ Towards key-dependent integral and impossible differential distinguishers on 5-round AES ⋮ Differential attacks: using alternative operations ⋮ On circulant involutory MDS matrices ⋮ Almost involutory recursive MDS diffusion layers ⋮ A new hybrid chaotic map and its application on image encryption and hiding ⋮ Information leakage of VGF2 structure ⋮ An ID-based signcryption scheme with compartmented secret sharing for unsigncryption ⋮ AKF: a key alternating Feistel scheme for lightweight cipher designs ⋮ Cryptographic properties and application of a generalized unbalanced Feistel network structure ⋮ Modeling energy-efficient secure communications in multi-mode wireless mobile devices ⋮ Almost universal forgery attacks on AES-based MAC's ⋮ A methodology for differential-linear cryptanalysis and its applications ⋮ Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512 ⋮ On weak differential uniformity of vectorial Boolean functions as a cryptographic criterion ⋮ Quantum key-recovery on full AEZ ⋮ On the direct construction of recursive MDS matrices ⋮ Improving impossible-differential attacks against Rijndael-160 and Rijndael-224 ⋮ Towards a general construction of recursive MDS diffusion layers ⋮ Improving the security and efficiency of block ciphers based on LS-designs ⋮ Statistical integral distinguisher with multi-structure and its application on AES-like ciphers ⋮ A novel secure image transmission scheme based on synchronization of fractional-order discrete-time hyperchaotic systems ⋮ Minimizing the two-round Even-Mansour cipher ⋮ Image encryption with chaotically coupled chaotic maps ⋮ A new counting method to bound the number of active S-boxes in Rijndael and 3D ⋮ Generic attacks on the Lai-Massey scheme ⋮ Cellular automata based S-boxes ⋮ Solving polynomial systems with noise over \(\mathbb{F}_2\): revisited ⋮ A novel method to identify initial values of chaotic maps in cybersecurity ⋮ Impossible differential cryptanalysis using matrix method ⋮ Linearly equivalent s-boxes and the division property ⋮ The (related-key) impossible boomerang attack and its application to the AES block cipher ⋮ Image encryption using chaotic coupled map lattices with time-varying delays ⋮ A note on some algebraic trapdoors for block ciphers ⋮ CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks ⋮ The effects of the omission of last round's MixColumns on AES ⋮ MRHS solver based on linear algebra and exhaustive search ⋮ New LSB-based colour image steganography method to enhance the efficiency in payload capacity, security and integrity check ⋮ Nonlinear diffusion layers ⋮ An application of the O'Nan-Scott theorem to the group generated by the round functions of an AES-like cipher ⋮ Group theoretic properties of Rijndael-like ciphers ⋮ The replacement of irreducible polynomial and affine mapping for the construction of a strong S-box ⋮ G-perfect nonlinear functions ⋮ Solving multiple right hand sides linear equations ⋮ Provable security of block ciphers against linear cryptanalysis: a mission impossible? ⋮ New criteria for linear maps in AES-like ciphers ⋮ Revisiting Gilbert's known-key distinguisher ⋮ On complexity of round transformations ⋮ Practical forgeries for ORANGE ⋮ Provable one-XOR matrices for construction of 4 × 4 hardware-oriented MDS diffusion layers ⋮ Constructing Strong S-Box by 2D Chaotic Map with Application to Irreversible Parallel Key Expansion ⋮ Extending AES improvements: A proposal for Alpha-MAC in view of collision resistance ⋮ SQUARE attack on block ciphers with low algebraic degree ⋮ MixColumns Coefficient Property and Security of the AES with A Secret S-Box ⋮ Practical Fault Attacks on Minalpher: How to Recover Key with Minimum Faults? ⋮ Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails ⋮ Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers ⋮ Unnamed Item ⋮ An algorithm for computing the upper bound for non-minimum weight differentials in 2-round LSX-ciphers ⋮ Primitivity of PRESENT and other lightweight ciphers ⋮ Cryptanalysis of Grindahl ⋮ Differential spectra of a class of power permutations with Niho exponents ⋮ Security enhancement method using shortened error correcting codes ⋮ Effective and efficient masking with low noise using small-Mersenne-prime ciphers ⋮ Enhanced design and hardware implementation of a chaos-based block cipher for image protection ⋮ Optimized quantum implementation of AES ⋮ Truncated boomerang attacks and application to AES-based ciphers ⋮ A cryptographic and coding-theoretic perspective on the global rules of cellular automata ⋮ Energy consumption of protected cryptographic hardware cores. An experimental study ⋮ Differential and linear properties of vectorial Boolean functions based on chi ⋮ On the primitivity of the AES-128 key-schedule ⋮ Introducing a new connection between the entries of MDS matrices constructed by generalized Cauchy matrices in \(GF(2^q)\) ⋮ Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing ⋮ Triangulating rebound attack on AES-like hashing ⋮ Triplicate functions ⋮ Construction of recursive MDS matrices using DLS matrices ⋮ FUTURE: a lightweight block cipher using an optimal diffusion matrix ⋮ A small GIFT-COFB: lightweight bit-serial architectures ⋮ A Very Compact “Perfectly Masked” S-Box for AES ⋮ Security Analysis of Some Diffusion Mechanisms Used in Chaotic Ciphers ⋮ Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers ⋮ Affine transformation in cryptography ⋮ Efficient Finite Fields in the Maxima Computer Algebra System ⋮ On Cryptographically Significant Mappings over GF(2 n ) ⋮ A Meet-in-the-Middle Attack on 8-Round AES ⋮ Efficient Chaotic Encryption Scheme with OFB Mode ⋮ New Applications of Differential Bounds of the SDS Structure ⋮ Trace representations of S-boxes and their application ⋮ Vectorizing Higher-Order Masking ⋮ New statistical randomness tests: 4-bit template matching tests ⋮ PROBLEMS, SOLUTIONS AND EXPERIENCE OF THE FIRST INTERNATIONAL STUDENT’S OLYMPIAD IN CRYPTOGRAPHY ⋮ MATRIX FORMULA FOR THE SPECTRUM OF OUTPUT DISTRIBUTION OF BLOCK CIPHER SCHEME AND STATISTICAL CRITERION BASED ON THIS FORMULA ⋮ A MAC Mode for Lightweight Block Ciphers ⋮ Lightweight MDS Generalized Circulant Matrices ⋮ On the Construction of Lightweight Circulant Involutory MDS Matrices ⋮ Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE ⋮ Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck ⋮ Efficient Design Strategies Based on the AES Round Function ⋮ ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES ⋮ MATHEMATICAL METHODS IN SOLUTIONS OF THE PROBLEMS PRESENTED AT THE THIRD INTERNATIONAL STUDENTS’ OLYMPIAD IN CRYPTOGRAPHY ⋮ An algorithm for finding the minimum degree of a polynomial over a finite field for a function over a vector space depending on the choice of an irreducible polynomial ⋮ Information Reconciliation Using Reliability in Secret Key Agreement Scheme with ESPAR Antenna ⋮ Двойственность разностного и линейного методов в криптографии ⋮ StriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012 ⋮ Finding Effective SAT Partitionings Via Black-Box Optimization ⋮ Efficient Image Encryption Scheme Based on 4-Dimensional Chaotic Maps ⋮ On Integral Distinguishers of Rijndael Family of Ciphers ⋮ Unnamed Item ⋮ A New Structural-Differential Property of 5-Round AES ⋮ On the Multi-output Filtering Model and Its Applications ⋮ Scalable PP-1 block cipher ⋮ Programmable Cellular Automata (PCA) Based Advanced Encryption Standard (AES) Hardware Architecture ⋮ Slide Attacks on a Class of Hash Functions ⋮ A New Attack on the LEX Stream Cipher ⋮ On the Higher Order Nonlinearities of Boolean Functions and S-Boxes, and Their Generalizations ⋮ Improved key recovery attacks on reduced-round AES with practical data and memory complexities ⋮ Cryptanalysis of the CRUSH Hash Function ⋮ Analysis of Countermeasures Against Access Driven Cache Attacks on AES ⋮ More constructions of differentially 4-uniform permutations on \(\mathbb {F}_{2^{2k}}\) ⋮ Boosting AES Performance on a Tiny Processor Core ⋮ Speeding up Collision Search for Byte-Oriented Hash Functions ⋮ Рассеивающие свойства XSLP-шифров ⋮ Анализ влияния линейной избыточности в S-боксах на аффинную эквивалентность в раундовых функциях XSL-схем ⋮ Спектрально-линейный и спектрально-дифференциальный методы построения S-бокcов с близкими к оптимальным значениями криптографических параметров ⋮ Показатели рассеивания линейной среды AES-подобных алгоритмов шифрования ⋮ Полное описание одного класса MDS-матриц над конечным полем характеристики 2 ⋮ The permutation group insight on the diffusion property of linear mappings ⋮ On software implementation of Kuznyechik on Intel CPUs ⋮ Linear and differential cryptanalysis: Another viewpoint ⋮ О линейном и разностном криптоанализе AES-подобных алгоритмов шифрования ⋮ Permutation Binomial Functions over Finite Fields ⋮ Attacking 9 and 10 Rounds of AES-256 ⋮ Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure ⋮ Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT ⋮ Impossible Differential Cryptanalysis of Reduced-Round SKINNY ⋮ Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks ⋮ An Improved Fault Based Attack of the Advanced Encryption Standard ⋮ Cryptanalysis of a Generic Class of White-Box Implementations ⋮ Two Attacks on RadioGatún ⋮ New Related-Key Boomerang Attacks on AES ⋮ New Impossible Differential Attacks on AES ⋮ New AES Software Speed Records ⋮ Unnamed Item ⋮ The Complexity of Public-Key Cryptography ⋮ A Search Strategy to Optimize the Affine Variant Properties of S-Boxes ⋮ Flaws of hypercube-like ciphers ⋮ Algorithm 959 ⋮ Hamming Weight Attacks on Cryptographic Hardware — Breaking Masking Defense ⋮ Practical key recovery attacks on FlexAEAD ⋮ Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended version ⋮ Efficient generation of quadratic cyclotomic classes for shortest quadratic decompositions of polynomials ⋮ Invariants for EA- and CCZ-equivalence of APN and AB functions ⋮ Quantum algorithm for Boolean equation solving and quantum algebraic attack on cryptosystems ⋮ Construction of higher-level MDS matrices in nested SPNs ⋮ Creation of S-box based on a hierarchy of Julia sets: image encryption approach ⋮ A note on APN permutations in even dimension ⋮ Efficient key-dependent dynamic S-boxes based on permutated elliptic curves ⋮ An STP-based model toward designing S-boxes with good cryptographic properties ⋮ \(k\)-configurations ⋮ Differential-ML distinguisher: machine learning based generic extension for differential cryptanalysis ⋮ The design of composite permutations with applications to DES-like S-boxes ⋮ Projective aspects of the AES inversion ⋮ Mixture integral attacks on reduced-round AES with a known/secret S-box ⋮ Computing expected differential probability of (truncated) differentials and expected linear potential of (multidimensional) linear hulls in SPN block ciphers ⋮ Pholkos -- efficient large-state tweakable block ciphers from the AES round function ⋮ Transparency order of \((n, m)\)-functions -- its further characterization and applications ⋮ Computing the distribution of differentials over the non-linear mapping \(\chi \) ⋮ MILP based differential attack on round reduced WARP ⋮ Survey on recent trends towards generalized differential and boomerang uniformities ⋮ Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers ⋮ Aggregated differentials and cryptanalysis of PP-1 and GOST ⋮ Private computation of polynomials over networks ⋮ Asymptotically quasi-optimal cryptography ⋮ Randomized nonlinear software-oriented MDS diffusion layers ⋮ Improved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-128 ⋮ On the relationship between resilient Boolean functions and linear branch number of S-boxes ⋮ Exploring lightweight efficiency of ForkAES ⋮ Unicyclic strong permutations ⋮ New constructions of involutions over finite fields ⋮ Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT ⋮ A novel efficient image encryption algorithm based on affine transformation combine with linear fractional transformation ⋮ The unified image encryption algorithm based on chaos and cubic S-box ⋮ The phantom of differential characteristics ⋮ Some group-theoretical results on Feistel networks in a long-key scenario ⋮ The number of affine equivalent classes and extended affine equivalent classes of vectorial Boolean functions ⋮ System-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memory ⋮ Lesamnta-LW revisited: improved security analysis of primitive and new PRF mode ⋮ Recursive MDS matrices over finite commutative rings ⋮ Rigid commutators and a normalizer chain ⋮ Bounding the length of impossible differentials for SPN block ciphers ⋮ PC-SyncBB: a privacy preserving collusion secure DCOP algorithm ⋮ Upper-bound estimation of the average probabilities of integer-valued differentials in the composition of key adder, substitution block, and shift operator ⋮ Composable security against collective attacks of a modified BB84 QKD protocol with information only in one basis ⋮ Periodic template tests: a family of statistical randomness tests for a collection of binary sequences ⋮ Regular subgroups with large intersection ⋮ White-box cryptography: don't forget about grey-box attacks ⋮ Efficient cache attacks on AES, and countermeasures ⋮ The resistance of PRESENT-80 against related-key differential attacks ⋮ On the constructions of \(n\)-cycle permutations ⋮ Troika: a ternary cryptographic hash function ⋮ Breaking LWC candidates: sESTATE and Elephant in quantum setting ⋮ Construction of MDS matrices from generalized Feistel structures ⋮ Construction of lightweight involutory MDS matrices ⋮ Computing AES related-key differential characteristics with constraint programming ⋮ Cryptographic properties of small bijective S-boxes with respect to modular addition ⋮ Design of fault-resilient S-boxes for AES-like block ciphers ⋮ The \(c\)-differential behavior of the inverse function under the \textit{EA}-equivalence ⋮ Semi-generic construction of public key encryption and identity-based encryption with equality test ⋮ Security analysis of subterranean 2.0 ⋮ Distinguisher on full-round compression function of GOST R ⋮ Digital image scrambling based on a new one-dimensional coupled sine map ⋮ Chaotic substitution for highly autocorrelated data in encryption algorithm ⋮ On invariant subspaces in the Lai-Massey scheme and a primitivity reduction ⋮ An efficient anti-quantum lattice-based blind signature for blockchain-enabled systems ⋮ New slide attacks on almost self-similar ciphers ⋮ The retracing boomerang attack ⋮ \textsc{Friet}: an authenticated encryption scheme with built-in fault detection ⋮ New representations of the AES key schedule ⋮ Automatic search of meet-in-the-middle preimage attacks on AES-like hashing ⋮ \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields ⋮ Three third generation attacks on the format preserving encryption scheme FF3 ⋮ Leakage resilient value comparison with application to message authentication ⋮ Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles ⋮ A chain of normalizers in the Sylow 2-subgroups of the symmetric group on \({\mathbf{2}}^n\) letters ⋮ The inverse of circulant matrices over \(\mathrm{GF}(2^m )\) ⋮ Improvements in the computing efficiency of the probabilities of the LIL test for the PRNG evaluation ⋮ SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations ⋮ R-2 composition tests: a family of statistical randomness tests for a collection of binary sequences ⋮ On the construction of \(4 \times 4\) lightweight involutory MDS matrices over \(\mathbb{F}_{2^8}\) ⋮ Differential \(\delta \)-uniformity and non-linearity of permutations over \(\mathbb{Z}_n\) ⋮ More accurate results on the provable security of AES against impossible differential cryptanalysis ⋮ Optimizing a password hashing function with hardware-accelerated symmetric encryption ⋮ The summation-truncation hybrid: reusing discarded bits for free ⋮ A white-box speck implementation using self-equivalence encodings ⋮ Improved differential-linear attack with application to round-reduced Speck32/64 ⋮ Explicit values of the DDT, the BCT, the FBCT, and the FBDT of the inverse, the Gold, and the Bracken-Leander S-boxes ⋮ Efficient recursive diffusion layers for block ciphers and hash functions ⋮ The rebound attack and subspace distinguishers: application to Whirlpool ⋮ Revocable hierarchical identity-based authenticated key exchange ⋮ Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions ⋮ On the algebraic construction of cryptographically good \(32 \times 32\) binary linear transformations ⋮ Integral characteristics by keyspace partitioning ⋮ Regular complete permutation polynomials over \(\mathbb{F}_{2^n} \) ⋮ Generating nonlinear codes for multi-bit symbol error correction using cellular automata ⋮ Towards efficient LPN-based symmetric encryption ⋮ Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound ⋮ TNT: how to tweak a block cipher ⋮ On a generalization of substitution-permutation networks: the HADES design strategy ⋮ A theoretical analysis of generalized invariants of bijective S-boxes ⋮ Key structures: improved related-key boomerang attack against the full AES-256 ⋮ Truncated differential properties of the diagonal set of inputs for 5-round AES ⋮ Light but tight: lightweight composition of serialized S-boxes with diffusion layers for strong ciphers ⋮ On construction of lightweight MDS matrices ⋮ MDOPE: efficient multi-dimensional data order preserving encryption scheme ⋮ On the image of an affine subspace under the inverse function within a finite field ⋮ Quantum impossible differential attacks: applications to AES and SKINNY ⋮ Non-existence of one-byte active impossible differentials for 5-round AES in the master-key setting ⋮ Jammin' on the deck ⋮ Optimizing the depth of quantum implementations of linear layers ⋮ Clustering effect of iterative differential and linear trails ⋮ Revisiting related-key boomerang attacks on AES using computer-aided tool ⋮ Layout graphs, random walks and the \(t\)-wise independence of SPN block ciphers ⋮ Construction of chaotic quantum magnets and matrix Lorenz systems S-boxes and their applications ⋮ Convexity of division property transitions: theory, algorithms and compact models ⋮ Astrolabous: a universally composable time-lock encryption scheme ⋮ Tight security for key-alternating ciphers with correlated sub-keys ⋮ Sequential indifferentiability of confusion-diffusion networks ⋮ Algebraic properties of subquasigroups and construction of finite quasigroups ⋮ And Rijndael? Automatic related-key differential analysis of Rijndael ⋮ Several MILP-Aided Attacks Against SNOW 2.0 ⋮ Simplified MITM modeling for permutations: new (quantum) attacks ⋮ Semantic foundations for cost analysis of pipeline-optimized programs ⋮ Four by four MDS matrices with the fewest XOR gates based on words ⋮ \textsf{ISAP+}: \textsf{ISAP} with fast authentication ⋮ Improved truncated differential distinguishers of AES with concrete S-box ⋮ Revisiting \textit{BoolTest} -- on randomness testing using Boolean functions ⋮ Quantum circuit implementations of SM4 block cipher based on different gate sets ⋮ Practical non-malleable codes from symmetric-key primitives in 2-split-state model ⋮ Impossible differential cryptanalysis on reduced-round PRINCEcore ⋮ Exploring encrypted keyboards to defeat client-side scanning in end-to-end encryption systems ⋮ Further insights on constructing quantum circuits for Camellia block cipher ⋮ From unbalanced to perfect: implementation of low energy stream ciphers ⋮ Twin column parity mixers and Gaston. A new mixing layer and permutation ⋮ Revisiting the indifferentiability of the sum of permutations ⋮ Automatic boomerang attacks search on Rijndael
Uses Software
This page was built for publication: