Another Look at Complementation Properties
From MaRDI portal
Publication:3577970
DOI10.1007/978-3-642-13858-4_20zbMath1279.94055OpenAlexW1554594656MaRDI QIDQ3577970
Charles Bouillaguet, Pierre-Alain Fouque, Gaëtan Leurent, Orr Dunkelman
Publication date: 13 July 2010
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://hal.inria.fr/inria-00556674/file/FSE2010.pdf
Related Items (12)
On the resilience of Even-Mansour to invariant permutations ⋮ Complementing Feistel Ciphers ⋮ Reflection Cryptanalysis of PRINCE-Like Ciphers ⋮ Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials ⋮ Nonlinear Invariant Attack ⋮ Lesamnta-LW revisited: improved security analysis of primitive and new PRF mode ⋮ Almost universal forgery attacks on AES-based MAC's ⋮ Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64 ⋮ Reflection cryptanalysis of PRINCE-like ciphers ⋮ Meet-in-the-Middle Attacks on Reduced-Round XTEA ⋮ Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round Lesamnta and SHAvite-3 512 ⋮ Security Analysis of SIMD
Uses Software
This page was built for publication: Another Look at Complementation Properties