Publication:4365764

From MaRDI portal


zbMath0885.94023MaRDI QIDQ4365764

Kaisa Nyberg

Publication date: 3 May 1998



94A60: Cryptography


Related Items

Lombardi Drawings of Knots and Links, The interpolation attack on block ciphers, Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques, Unnamed Item, Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECK, Linear Cryptanalysis of Non Binary Ciphers, 3D: A Three-Dimensional Block Cipher, Correlation theorems in cryptanalysis, Block cipher invariants as eigenvectors of correlation matrices, Improved differential-linear attacks with applications to ARX ciphers, On the Role of Key Schedules in Attacks on Iterated Ciphers, Clustering effect of iterative differential and linear trails, A geometric approach to linear cryptanalysis, Clustering effect in \textsc{Simon} and \textsc{Simeck}, On the differential and linear efficiency of balanced Feistel networks, Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity, Cryptographic properties and application of a generalized unbalanced Feistel network structure, On quadratic approximations in block ciphers, Zero-correlation linear cryptanalysis with equal treatment for plaintexts and tweakeys, Generalization of Matsui's Algorithm 1 to linear hull for key-alternating block ciphers, Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli}, Improving key-recovery in linear attacks: application to 28-round PRESENT, Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles, Computing expected differential probability of (truncated) differentials and expected linear potential of (multidimensional) linear hulls in SPN block ciphers, Revisiting the wrong-key-randomization hypothesis, Differential-linear cryptanalysis revisited, Integral cryptanalysis on full MISTY1, Linear hulls with correlation zero and linear cryptanalysis of block ciphers, Luby-Rackoff revisited: on the use of permutations as inner functions of a Feistel scheme, Security evaluation of MISTY structure with SPN round function, Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher, Construction of Lightweight S-Boxes Using Feistel and MISTY Structures, Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-Guessing Techniques, Wide Trail Design Strategy for Binary MixColumns, Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey, Linear Cryptanalysis of the PP-1 and PP-2 Block Ciphers, On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2, FPGA Implementation of a Statistical Saturation Attack against PRESENT, Linear Approximations of Addition Modulo 2n-1, On Linear Hulls and Trails, Linear and differential cryptanalysis: Another viewpoint, О линейном и разностном криптоанализе AES-подобных алгоритмов шифрования, Toward the True Random Cipher: On Expected Linear Probability Values for SPNS with Randomly Selected S-Boxes, Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent, Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure, Generic Attacks on Feistel Networks with Internal Permutations, The Cryptanalysis of Reduced-Round SMS4