scientific article

From MaRDI portal
Publication:4036895

zbMath0764.94017MaRDI QIDQ4036895

Xuejia Lai, James L. Massey

Publication date: 18 May 1993


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (45)

Practical Attack on the Full MMB Block CipherSecret sets and applicationsArbitrated unconditionally secure authentication scheme with multi-sendersOn some block ciphers and imprimitive groupsFourier transforms and bent functions on finite groupsConstructing $8$-bit permutations, $8$-bit involutions and $8$-bit orthomorphisms with almost optimal cryptographic parametersA bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysisDifferential cryptanalysis of LuciferHigher order differentiation over finite fields with applications to generalising the cube attackNonlinear functions and difference sets on group actionsCryptanalysis of WIDEAType-preserving matrices and security of block ciphersA further study on bridge structures and constructing bijective S-boxes for low-latency maskingFrom Farfalle to \textsc{Megafono} via Ciminion: the PRF \textsc{Hydra} for MPC applicationsAn innovative approach towards image encryption by using novel PRNs and S-boxes modeling techniquesSequential indifferentiability of confusion-diffusion networksQuantum attacks on Lai-Massey structureOn Lai-Massey and quasi-Feistel ciphersPseudorandomness analysis of the (extended) Lai-Massey schemeInvertible quadratic non-linear functions over \(\mathbb{F}_p^n\) via multiple local maps\texttt{Horst} meets \textit{Fluid}-SPN: Griffin for zero-knowledge applicationsDifferential experiments using parallel alternative operationsA bit-vector differential model for the modular addition by a constantDeniability of Symmetric Encryption Based on Computational Indistinguishability from Probabilistic CipheringOn the group generated by the round functions of translation based ciphers over arbitrary finite fieldsAn upper bound for the linearity of exponential Welch-Costas functionsParameterized hash functionsIntegral attacks on round-reduced Bel-T-256Statistical integral attack on CAST-256 and IDEAMinimizing the two-round Even-Mansour cipherGeneric attacks on the Lai-Massey schemeGroup polynomials over ringsAuthenticated key agreement in dynamic peer groupsLogistic map as a block encryption algorithmLinear Cryptanalysis of Non Binary CiphersPerfect nonlinear functions and cryptographyG-perfect nonlinear functionsOn invariant subspaces in the Lai-Massey scheme and a primitivity reduction$\mathsf{XS}$-circuits in block ciphersAn analysis of international data encryption algorithm(IDEA) security against differential cryptanalysisMultiscale transform-based secured joint efficient medical image compression-encryption using symmetric key cryptography and ebcot encoding techniqueUnnamed ItemSide channel cryptanalysis of product ciphersJEROBOAMFeedback linearly extended discrete functions




This page was built for publication: