scientific article
From MaRDI portal
Publication:3722412
zbMath0592.94009MaRDI QIDQ3722412
David Chaum, Jan-Hendrik Evertse
Publication date: 1986
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items
Algebraic nonlinearity and its applications to cryptography, Bicliques with Minimal Data and Time Complexity for AES, Counting Boolean functions with faster points, A single-key attack on the full GOST block cipher, Construction of highly nonlinear resilient S-boxes with given degree, The structured design of cryptographically good s-boxes, Nondegenerate functions and permutations, Fast Correlation Attacks: Methods and Countermeasures, A Single-Key Attack on the Full GOST Block Cipher, Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes, Algebraic Cryptanalysis of the Data Encryption Standard, Факторструктуры преобразований, Improved Meet-in-the-Middle Attacks on Reduced-Round DES, Meet-in-the-Middle Attacks on Reduced-Round XTEA, A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN, The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS, New attacks on IDEA with at least 6 rounds, Differential cryptanalysis of DES-like cryptosystems