scientific article
From MaRDI portal
Publication:4036895
zbMath0764.94017MaRDI QIDQ4036895
Publication date: 18 May 1993
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (45)
Practical Attack on the Full MMB Block Cipher ⋮ Secret sets and applications ⋮ Arbitrated unconditionally secure authentication scheme with multi-senders ⋮ On some block ciphers and imprimitive groups ⋮ Fourier transforms and bent functions on finite groups ⋮ Constructing $8$-bit permutations, $8$-bit involutions and $8$-bit orthomorphisms with almost optimal cryptographic parameters ⋮ A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis ⋮ Differential cryptanalysis of Lucifer ⋮ Higher order differentiation over finite fields with applications to generalising the cube attack ⋮ Nonlinear functions and difference sets on group actions ⋮ Cryptanalysis of WIDEA ⋮ Type-preserving matrices and security of block ciphers ⋮ A further study on bridge structures and constructing bijective S-boxes for low-latency masking ⋮ From Farfalle to \textsc{Megafono} via Ciminion: the PRF \textsc{Hydra} for MPC applications ⋮ An innovative approach towards image encryption by using novel PRNs and S-boxes modeling techniques ⋮ Sequential indifferentiability of confusion-diffusion networks ⋮ Quantum attacks on Lai-Massey structure ⋮ On Lai-Massey and quasi-Feistel ciphers ⋮ Pseudorandomness analysis of the (extended) Lai-Massey scheme ⋮ Invertible quadratic non-linear functions over \(\mathbb{F}_p^n\) via multiple local maps ⋮ \texttt{Horst} meets \textit{Fluid}-SPN: Griffin for zero-knowledge applications ⋮ Differential experiments using parallel alternative operations ⋮ A bit-vector differential model for the modular addition by a constant ⋮ Deniability of Symmetric Encryption Based on Computational Indistinguishability from Probabilistic Ciphering ⋮ On the group generated by the round functions of translation based ciphers over arbitrary finite fields ⋮ An upper bound for the linearity of exponential Welch-Costas functions ⋮ Parameterized hash functions ⋮ Integral attacks on round-reduced Bel-T-256 ⋮ Statistical integral attack on CAST-256 and IDEA ⋮ Minimizing the two-round Even-Mansour cipher ⋮ Generic attacks on the Lai-Massey scheme ⋮ Group polynomials over rings ⋮ Authenticated key agreement in dynamic peer groups ⋮ Logistic map as a block encryption algorithm ⋮ Linear Cryptanalysis of Non Binary Ciphers ⋮ Perfect nonlinear functions and cryptography ⋮ G-perfect nonlinear functions ⋮ On invariant subspaces in the Lai-Massey scheme and a primitivity reduction ⋮ $\mathsf{XS}$-circuits in block ciphers ⋮ An analysis of international data encryption algorithm(IDEA) security against differential cryptanalysis ⋮ Multiscale transform-based secured joint efficient medical image compression-encryption using symmetric key cryptography and ebcot encoding technique ⋮ Unnamed Item ⋮ Side channel cryptanalysis of product ciphers ⋮ JEROBOAM ⋮ Feedback linearly extended discrete functions
This page was built for publication: