scientific article

From MaRDI portal
Publication:3046335

zbMath1045.94513MaRDI QIDQ3046335

Monica Chew, David Wagner, Nikita Borisov, Rob Johnson

Publication date: 12 August 2004

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2365/23650017.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (23)

Characters, Weil sums and \(c\)-differential uniformity with an application to the perturbed Gold functionOn \((-1)\)-differential uniformity of ternary APN power functionsSurvey on recent trends towards generalized differential and boomerang uniformitiesOn construction and (non)existence of \(c\)-(almost) perfect nonlinear functionsOn the \(c\)-differential spectrum of power functions over finite fieldsPolynomials with maximal differential uniformity and the exceptional APN conjectureInvestigations of \(c\)-differential uniformity of permutations with Carlitz rank 3Low \(c\)-differential uniformity of the swapped inverse function in odd characteristicA note on the \(c\)-differential spectrum of an AP\(c\)N functionOn non-monomial APcN permutations over finite fields of even characteristicThe \(c\)-differential uniformity and boomerang uniformity of three classes of permutation polynomials over \(\mathbb{F}_{2^n}\)Differential experiments using parallel alternative operationsOn a class of APN power functions over odd characteristic finite fields: their differential spectrum and \(c\)-differential propertiesA Unified Approach to Related-Key AttacksOn the \(c\)-differential uniformity of certain maps over finite fieldsInvestigations on \(c\)-boomerang uniformity and perfect nonlinearityNew P\(c\)N and AP\(c\)N functions over finite fieldsSome classes of power functions with low \(c\)-differential uniformity over finite fieldsThe \(c\)-differential behavior of the inverse function under the \textit{EA}-equivalenceSeveral classes of PcN power functions over finite fieldsLow \(c\)-differential uniformity for functions modified on subfieldsNew attacks on IDEA with at least 6 roundsDifferential entropy analysis of the IDEA block cipher


Uses Software



This page was built for publication: