scientific article; zbMATH DE number 177050
From MaRDI portal
Publication:4036895
zbMATH Open0764.94017MaRDI QIDQ4036895FDOQ4036895
Authors: Xuejia Lai, James L. Massey
Publication date: 18 May 1993
Title of this publication is not available (Why is that?)
Recommendations
Cited In (57)
- CCA security for contracting (quasi-)Feistel constructions with tight round complexity
- Yoyo attack on 4-round Lai-Massey scheme with secret round functions
- Revisiting higher-order differential-linear attacks from an algebraic perspective
- Generalized Feistel ciphers for efficient prime field masking
- Feistel-like structures revisited: classification and cryptanalysis
- Indifferentiability of 3-round confusion-diffusion networks
- Revisiting linearly extended discrete functions
- Software encryption: New 64-bit block cryptoscheme
- On design and analysis of a new block cipher
- Constructing 8-bit permutations, 8-bit involutions and 8-bit orthomorphisms with almost optimal cryptographic parameters
- Minimizing the two-round Even-Mansour cipher
- Multiscale transform-based secured joint efficient medical image compression-encryption using symmetric key cryptography and ebcot encoding technique
- Quantum attacks on Lai-Massey structure
- Fourier transforms and bent functions on finite groups
- Type-preserving matrices and security of block ciphers
- Parameterized hash functions
- Higher order differentiation over finite fields with applications to generalising the cube attack
- Side channel cryptanalysis of product ciphers
- Authenticated key agreement in dynamic peer groups
- On the group generated by the round functions of translation based ciphers over arbitrary finite fields
- Group polynomials over rings
- The block cipher algorithm-properties, encryption efficiency analysis and security evaluation
- On some block ciphers and imprimitive groups
- Pseudorandomness analysis of the (extended) Lai-Massey scheme
- Arbitrated unconditionally secure authentication scheme with multi-senders
- Secret sets and applications
- An upper bound for the linearity of exponential Welch-Costas functions
- Linear Cryptanalysis of Non Binary Ciphers
- Feedback linearly extended discrete functions
- G-perfect nonlinear functions
- A bit-vector differential model for the modular addition by a constant
- Sequential indifferentiability of confusion-diffusion networks
- Differential cryptanalysis of Lucifer
- Invertible quadratic non-linear functions over \(\mathbb{F}_p^n\) via multiple local maps
- \texttt{Horst} meets \textit{Fluid}-SPN: Griffin for zero-knowledge applications
- A further study on bridge structures and constructing bijective S-boxes for low-latency masking
- On Lai-Massey and quasi-Feistel ciphers
- A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis
- Differential experiments using parallel alternative operations
- JEROBOAM
- On invariant subspaces in the Lai-Massey scheme and a primitivity reduction
- Title not available (Why is that?)
- From Farfalle to \textsc{Megafono} via Ciminion: the PRF \textsc{Hydra} for MPC applications
- Logistic map as a block encryption algorithm
- \( \mathsf{XS} \)-circuits in block ciphers
- An innovative approach towards image encryption by using novel PRNs and S-boxes modeling techniques
- An analysis of international data encryption algorithm(IDEA) security against differential cryptanalysis
- Cryptanalysis of \textsc{Widea}
- Deniability of symmetric encryption based on computational indistinguishability from probabilistic ciphering
- Nonlinear functions and difference sets on group actions
- Perfect nonlinear functions and cryptography
- Fast block cipher proposal
- Integral attacks on round-reduced Bel-T-256
- On the sequential indifferentiability of the Lai-Massey construction
- Practical attack on the full MMB block cipher
- Statistical integral attack on CAST-256 and IDEA
- Generic attacks on the Lai-Massey scheme
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4036895)