Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem

From MaRDI portal
Publication:2829212

DOI10.1007/978-3-662-53008-5_4zbMath1391.94789OpenAlexW2503574445MaRDI QIDQ2829212

Aleksei Udovenko, Léo Perrin, Alex Biryukov

Publication date: 27 October 2016

Published in: Advances in Cryptology – CRYPTO 2016 (Search for Journal in Brave)

Full work available at URL: http://eprint.iacr.org/2016/539




Related Items (23)

Cryptographically strong permutations from the butterfly structureA further study of quadratic APN permutations in dimension nineImplicit Quadratic Property of Differentially 4-Uniform PermutationsA method to calculate differential uniformity for permutationsSurvey on recent trends towards generalized differential and boomerang uniformitiesOn a conjecture on APN permutationsIf a generalised butterfly is APN then it operates on 6 bitsOn permutation quadrinomials with boomerang uniformity 4 and the best-known nonlinearityA new class of differential 4-uniform permutations from exponential permutationCryptographic functions with interesting properties from CCZ-equivalenceMore low differential uniformity permutations over \(\mathbb{F}_{2^{2 k}}\) with \(k\) oddDecomposition of Dillon's APN permutation with efficient hardware implementationCompletely characterizing a class of permutation quadrinomialsNew design techniques for efficient arithmetization-oriented hash functions: \texttt{Anemoi} permutations and \texttt{Jive} compression modeOn CCZ-equivalence, extended-affine equivalence, and function twistingON CONSTRUCTING APN PERMUTATIONS USING SUBFUNCTIONSSeveral classes of linear codes with few weights from the closed butterfly structureOn an algorithm generating 2-to-1 APN functions and its applications to ``The big APN problemInvolutory differentially 4-uniform permutations from known constructionsПостроение подстановок пространства $V_{2m}$ с использованием $(2m,m)$-функцийОб алгебраической степени и дифференциальной равномерности подстановок пространства $V_{2m}$, построенных с использованием $(2m,m)$-функцийCryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN ProblemA note on ``Cryptographically strong permutations from the butterfly structure


Uses Software


Cites Work


This page was built for publication: Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem