Another look at complementation properties
From MaRDI portal
Publication:3577970
Recommendations
Cited in
(13)- The universal complementation property
- On the resilience of Even-Mansour to invariant permutations
- Lesamnta-LW revisited: improved security analysis of primitive and new PRF mode
- Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64
- Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64
- Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials
- Reflection Cryptanalysis of PRINCE-Like Ciphers
- Reflection cryptanalysis of PRINCE-like ciphers
- Security analysis of SIMD
- Almost universal forgery attacks on AES-based MAC's
- Attacks on hash functions based on Generalized Feistel: application to reduced-round \textit{Lesamnta} and \textit{SHAvite-3}\(_{512}\)
- Complementing Feistel ciphers
- Meet-in-the-middle attacks on reduced-round XTEA
This page was built for publication: Another look at complementation properties
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3577970)