Another look at complementation properties
From MaRDI portal
Publication:3577970
DOI10.1007/978-3-642-13858-4_20zbMATH Open1279.94055OpenAlexW1554594656MaRDI QIDQ3577970FDOQ3577970
Authors: Charles Bouillaguet, Orr Dunkelman, Gaëtan Leurent, Pierre-Alain Fouque
Publication date: 13 July 2010
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://hal.inria.fr/inria-00556674/file/FSE2010.pdf
Recommendations
Cited In (13)
- On the resilience of Even-Mansour to invariant permutations
- Lesamnta-LW revisited: improved security analysis of primitive and new PRF mode
- Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64
- Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64
- Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials
- Reflection Cryptanalysis of PRINCE-Like Ciphers
- Reflection cryptanalysis of PRINCE-like ciphers
- Security analysis of SIMD
- Almost universal forgery attacks on AES-based MAC's
- Attacks on hash functions based on Generalized Feistel: application to reduced-round \textit{Lesamnta} and \textit{SHAvite-3}\(_{512}\)
- Complementing Feistel ciphers
- Meet-in-the-middle attacks on reduced-round XTEA
- The universal complementation property
Uses Software
This page was built for publication: Another look at complementation properties
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3577970)