scientific article; zbMATH DE number 2009947
From MaRDI portal
Publication:4434867
Recommendations
Cited in
(56)- \texttt{HAWKEYE} -- recovering symmetric cryptography from hardware circuits
- Elementary abelian regular subgroups of vector space affine group related to cryptanalysis. II
- Collision-based attacks on white-box implementations of the AES block cipher
- Элементарные регулярные абелевы подгруппы аффинной группы векторного пространства в связи с анализом криптографических примитивов;Elementary Abelian regular subgroups of vector space affine group related to cryptanalysis
- A white-box speck implementation using self-equivalence encodings
- Invariants for EA- and CCZ-equivalence of APN and AB functions
- Results on rotation-symmetric S-boxes
- Analyzing the influence of linear redundancy in S-boxes on the affine equivalence within XSL-like round functions
- Reverse-engineering the S-Bbox of Streebog, Kuznyechik and Stribobr1
- Differential power analysis in Hamming weight model: how to choose among (extended) affine equivalent S-boxes
- A Search Strategy to Optimize the Affine Variant Properties of S-Boxes
- On CCZ-equivalence, extended-affine equivalence, and function twisting
- Cryptographic properties of small bijective S-boxes with respect to modular addition
- Linear redundancy in S-boxes.
- Key Recovery on Hidden Monomial Multivariate Schemes
- Circulant matrices and affine equivalence of monomial rotation symmetric Boolean functions
- On self-equivalence encodings in white-box implementations
- Affine equivalence for rotation symmetric Boolean functions with \(p^k\) variables
- Cryptographic analysis of all \(4 \times 4\)-bit s-boxes
- About linear and affine equivalence of substitutions
- Constructions of rotation symmetric bent functions with high algebraic degree
- Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem
- On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks
- Threshold implementations of small S-boxes
- Deciding EA-equivalence via invariants
- Affine equivalence and its application to tightening threshold implementations
- Computing the number of the equivalence classes for reversible logic functions
- Two notions of differential equivalence on Sboxes
- Implicit white-box implementations: white-boxing ARX ciphers
- On the classification of APN functions up to dimension five
- Cryptanalysis of two white-box implementations of the SM4 block cipher
- MRHS Equation Systems
- A linear equivalence algorithm
- Affine equivalence of quartic monomial rotation symmetric Boolean functions in prime power dimension
- Cryptanalysis of a Generic Class of White-Box Implementations
- An efficient affine equivalence algorithm for multiple S-boxes and a structured affine layer
- Invariant subspaces in SPN block cipher
- Cryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problem
- Affine equivalence of quartic homogeneous rotation symmetric Boolean functions
- Thinking outside the superbox
- The design of composite permutations with applications to DES-like S-boxes
- On the EA-classes of known APN functions in small dimensions
- Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX)
- On enumeration of polynomial equivalence classes
- Structural cryptanalysis of SASAS
- Key-recovery attacks on \(\mathsf{ASASA}\)
- Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects
- Pitfalls and shortcomings for decompositions and alignment
- Multiplicative complexity of bijective \(4\times 4\) \(S\)-boxes
- An improved affine equivalence algorithm for random permutations
- Application of composition primitive polynomials for implementation of large-scale S-boxes
- White-box cryptography: don't forget about grey-box attacks
- Affine equivalence in the AES round function
- Computing the number of affine equivalent classes on \(\mathcal{R}(s,n)/\mathcal{R}(k,n)\)
- \( \otimes_{\mathcal{W}} \)-Markovianity of XSL-block ciphers connected with properties of their round functions
- On affine classification of permutations on the space \(\mathrm{GF}(2)^3\)
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4434867)