scientific article; zbMATH DE number 177050
From MaRDI portal
Publication:4036895
Recommendations
Cited in
(57)- Software encryption: New 64-bit block cryptoscheme
- Minimizing the two-round Even-Mansour cipher
- Constructing 8-bit permutations, 8-bit involutions and 8-bit orthomorphisms with almost optimal cryptographic parameters
- On design and analysis of a new block cipher
- Fourier transforms and bent functions on finite groups
- Multiscale transform-based secured joint efficient medical image compression-encryption using symmetric key cryptography and ebcot encoding technique
- Type-preserving matrices and security of block ciphers
- Quantum attacks on Lai-Massey structure
- Parameterized hash functions
- Higher order differentiation over finite fields with applications to generalising the cube attack
- Authenticated key agreement in dynamic peer groups
- Side channel cryptanalysis of product ciphers
- On the group generated by the round functions of translation based ciphers over arbitrary finite fields
- Group polynomials over rings
- On some block ciphers and imprimitive groups
- The block cipher algorithm-properties, encryption efficiency analysis and security evaluation
- CCA security for contracting (quasi-)Feistel constructions with tight round complexity
- Yoyo attack on 4-round Lai-Massey scheme with secret round functions
- Pseudorandomness analysis of the (extended) Lai-Massey scheme
- Arbitrated unconditionally secure authentication scheme with multi-senders
- Secret sets and applications
- Revisiting higher-order differential-linear attacks from an algebraic perspective
- An upper bound for the linearity of exponential Welch-Costas functions
- G-perfect nonlinear functions
- Linear Cryptanalysis of Non Binary Ciphers
- Feedback linearly extended discrete functions
- A bit-vector differential model for the modular addition by a constant
- Differential cryptanalysis of Lucifer
- Sequential indifferentiability of confusion-diffusion networks
- A further study on bridge structures and constructing bijective S-boxes for low-latency masking
- Invertible quadratic non-linear functions over \(\mathbb{F}_p^n\) via multiple local maps
- \texttt{Horst} meets \textit{Fluid}-SPN: Griffin for zero-knowledge applications
- On Lai-Massey and quasi-Feistel ciphers
- A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis
- Differential experiments using parallel alternative operations
- JEROBOAM
- On invariant subspaces in the Lai-Massey scheme and a primitivity reduction
- scientific article; zbMATH DE number 7310171 (Why is no real title available?)
- From Farfalle to \textsc{Megafono} via Ciminion: the PRF \textsc{Hydra} for MPC applications
- Generalized Feistel ciphers for efficient prime field masking
- Logistic map as a block encryption algorithm
- \( \mathsf{XS} \)-circuits in block ciphers
- Feistel-like structures revisited: classification and cryptanalysis
- An innovative approach towards image encryption by using novel PRNs and S-boxes modeling techniques
- An analysis of international data encryption algorithm(IDEA) security against differential cryptanalysis
- Indifferentiability of 3-round confusion-diffusion networks
- Cryptanalysis of \textsc{Widea}
- Deniability of symmetric encryption based on computational indistinguishability from probabilistic ciphering
- Revisiting linearly extended discrete functions
- Nonlinear functions and difference sets on group actions
- Perfect nonlinear functions and cryptography
- Fast block cipher proposal
- Integral attacks on round-reduced Bel-T-256
- Practical attack on the full MMB block cipher
- On the sequential indifferentiability of the Lai-Massey construction
- Statistical integral attack on CAST-256 and IDEA
- Generic attacks on the Lai-Massey scheme
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4036895)