Publication:4279560

From MaRDI portal


zbMath0787.94014MaRDI QIDQ4279560

Eli Biham, Adi Shamir

Publication date: 7 March 1994



94A60: Cryptography


Related Items

Unnamed Item, On the guaranteed number of activations in $\mathsf{XS}$-circuits, CRITERIA FOR MARKOV BLOCK CIPHERS, Двойственность разностного и линейного методов в криптографии, A Bird’s-Eye View of Modern Symmetric Cryptography from Combinatorial Designs, A Search Strategy to Optimize the Affine Variant Properties of S-Boxes, Algorithm 959, Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006, Randomness and Representation of Span n Sequences, The Delicate Issues of Addition with Respect to XOR Differences, Fault Analysis Study of IDEA, New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers, Unnamed Item, Improved differential-linear attacks with applications to ARX ciphers, Rotational-XOR differential rectangle cryptanalysis on \textsc{Simon}-like ciphers, Effective and efficient masking with low noise using small-Mersenne-prime ciphers, New method for combining Matsui's bounding conditions with sequential encoding method, A further study on bridge structures and constructing bijective S-boxes for low-latency masking, A new class of differential 4-uniform permutations from exponential permutation, Fully automated differential-linear attacks against ARX ciphers, A theoretical analysis of generalized invariants of bijective S-boxes, Key structures: improved related-key boomerang attack against the full AES-256, Differential cryptanalysis of round-reduced \texttt{SPEEDY} family, On the field-based division property: applications to MiMC, Feistel MiMC and GMiMC, On perfect linear approximations and differentials over two-round SPNs, Differential meet-in-the-middle cryptanalysis, Moving a step of ChaCha in syncopated rhythm, BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers, Clustering effect in \textsc{Simon} and \textsc{Simeck}, Generic framework for key-guessing improvements, \textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher, Automated key recovery attacks on round-reduced Orthros, Differential cryptanalysis in the fixed-key model, Invertible quadratic non-linear functions over \(\mathbb{F}_p^n\) via multiple local maps, \textsc{Poseidon}2: a faster version of the \textsc{Poseidon} hash function, Twin column parity mixers and Gaston. A new mixing layer and permutation, \texttt{Horst} meets \textit{Fluid}-SPN: Griffin for zero-knowledge applications, Exhaustive Evaluation of Radius 2 Toggle Rules for a Variable-Length Cryptographic Cellular Automata-Based Model, eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices, Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties, A homophonic DES, Another look at normal approximations in cryptanalysis, Capability of evolutionary cryptosystems against differential cryptanalysis, Information leakage of VGF2 structure, AKF: a key alternating Feistel scheme for lightweight cipher designs, A methodology for differential-linear cryptanalysis and its applications, Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity, A new counting method to bound the number of active S-boxes in Rijndael and 3D, The (related-key) impossible boomerang attack and its application to the AES block cipher, Generic attacks with standard deviation analysis on a-Feistel schemes, Distinguishing properties and applications of higher order derivatives of Boolean functions, \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations, Weak-key distinguishers for AES, Improved (related-key) differential cryptanalysis on GIFT, Finding the differential characteristics of block ciphers with neural networks, Impossible differential cryptanalysis using matrix method, Differential and linear cryptanalysis for 2-round spns, Resistance of balanced s-boxes to linear and differential cryptanalysis, A method to calculate differential uniformity for permutations, Multiple (truncated) differential cryptanalysis: explicit upper bounds on data complexity, A pseudorandom number generator based on worst-case lattice problems, Rigorous upper bounds on data complexities of block cipher cryptanalysis, On the construction of hardware-friendly \(4\times4\) and \(5\times5\) S-boxes, Mind the gap -- a closer look at the security of block ciphers against differential cryptanalysis, Two notions of differential equivalence on Sboxes, On CCZ-equivalence, extended-affine equivalence, and function twisting, Highly nonlinear balanced Boolean functions with good local and global avalanche characteristics., One-way hash functions with changeable parameters., On the boomerang uniformity of quadratic permutations, Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64, On cryptographic properties of \((n+1)\)-bit S-boxes constructed by known \(n\)-bit S-boxes, Some classes of power functions with low \(c\)-differential uniformity over finite fields, \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields, Differential \(\delta \)-uniformity and non-linearity of permutations over \(\mathbb{Z}_n\), Improved differential-linear attack with application to round-reduced Speck32/64, Automatic verification of differential characteristics: application to reduced Gimli, Cryptanalysis results on spook. Bringing full-round shadow-512 to the light, Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX), Thinking outside the superbox, Differential-linear cryptanalysis of the lightweight crytographic algorithm KNOT, More accurate division property propagations based on optimized implementations of linear layers, Cryptanalysis of the permutation based algorithm SpoC, Computing expected differential probability of (truncated) differentials and expected linear potential of (multidimensional) linear hulls in SPN block ciphers, New attacks from old distinguishers improved attacks on serpent, Pholkos -- efficient large-state tweakable block ciphers from the AES round function, Differential uniformity and linearity of S-boxes by multiplicative complexity, Revamped differential-linear cryptanalysis on reduced round ChaCha, A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis, Information-combining differential fault attacks on DEFAULT, On the relationship between resilient Boolean functions and linear branch number of S-boxes, If a generalised butterfly is APN then it operates on 6 bits, Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT, The phantom of differential characteristics, Efficient recursive diffusion layers for block ciphers and hash functions, Difference of function on vector space over \(\mathbb F\), On the algebraic construction of cryptographically good \(32 \times 32\) binary linear transformations, Differential entropy analysis of the IDEA block cipher, Projective aspects of the AES inversion, Differential-linear cryptanalysis revisited, Integral cryptanalysis on full MISTY1, A new matrix form to generate all \(3\times 3\) involutory MDS matrices over \(\mathbb{F}_{2^m}\), Differential attack on five rounds of the SC2000 block cipher, Linear hulls with correlation zero and linear cryptanalysis of block ciphers, Multi-objective optimisation of bijective S-boxes, The designs of S-boxes by simulated annealing, Perfect nonlinear functions and cryptography, Multiple differential-zero correlation linear cryptanalysis of reduced-round CAST-256, Rotational-linear attack: a new framework of cryptanalysis on ARX ciphers with applications to Chaskey, An algebraic attack on ciphers with low-degree round functions: application to full MiMC, Cryptanalysis of Ascon, Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA, Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework, Pen and Paper Arguments for SIMON and SIMON-like Designs, Lightweight Multiplication in $$GF(2^n)$$ with Applications to MDS Matrices, Cryptographic Analysis of All 4 × 4-Bit S-Boxes, Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher, CUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to Mask, Nonlinear Invariant Attack, Improved Differential Cryptanalysis of CAST-128 and CAST-256, SPF: A New Family of Efficient Format-Preserving Encryption Algorithms, Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations, Multiple Differential Cryptanalysis: Theory and Practice, Breaking Grain-128 with Dynamic Cube Attacks, Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes, Differential-Multiple Linear Cryptanalysis, Mars Attacks! Revisited:, Рассеивающие свойства XSLP-шифров, О свойствах блочных алгоритмов шифрования Магма и Кузнечик в режиме CTR с преобразованием ключа методом CryptoPro Key Meshing, Полное описание одного класса MDS-матриц над конечным полем характеристики 2, Practical significance of security bounds for standardized internally re-keyed block cipher modes, Linear and differential cryptanalysis: Another viewpoint, О линейном и разностном криптоанализе AES-подобных алгоритмов шифрования, Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails, The Stream Cipher HC-128, Cryptanalysis of Reduced-Round SMS4 Block Cipher, Impossible Differential Cryptanalysis of CLEFIA, Attacks on the DECT Authentication Mechanisms