scientific article; zbMATH DE number 2009947
zbMATH Open1038.94521MaRDI QIDQ4434867FDOQ4434867
Authors: Alex Biryukov, Christophe De Cannière, An Braeken, Bart Preneel
Publication date: 26 November 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2656/26560033.htm
Title of this publication is not available (Why is that?)
Recommendations
DESS-boxesRijndaelCryptanalysisLinearaffine equivalence algorithmS-box decompositionAlgebraic attacksBlock-ciphersSide-channel attacks
Data encryption (aspects in computer science) (68P25) Measures of information, entropy (94A17) Cryptography (94A60)
Cited In (56)
- Collision-based attacks on white-box implementations of the AES block cipher
- Elementary abelian regular subgroups of vector space affine group related to cryptanalysis. II
- \texttt{HAWKEYE} -- recovering symmetric cryptography from hardware circuits
- Элементарные регулярные абелевы подгруппы аффинной группы векторного пространства в связи с анализом криптографических примитивов;Elementary Abelian regular subgroups of vector space affine group related to cryptanalysis
- Reverse-engineering the S-Bbox of Streebog, Kuznyechik and Stribobr1
- Threshold implementations of small S-boxes
- Two notions of differential equivalence on Sboxes
- On self-equivalence encodings in white-box implementations
- On the EA-classes of known APN functions in small dimensions
- Application of composition primitive polynomials for implementation of large-scale S-boxes
- On CCZ-equivalence, extended-affine equivalence, and function twisting
- An improved affine equivalence algorithm for random permutations
- Affine equivalence for rotation symmetric Boolean functions with \(p^k\) variables
- The design of composite permutations with applications to DES-like S-boxes
- Multiplicative complexity of bijective \(4\times 4\) \(S\)-boxes
- Affine equivalence in the AES round function
- Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects
- White-box cryptography: don't forget about grey-box attacks
- Invariants for EA- and CCZ-equivalence of APN and AB functions
- An efficient affine equivalence algorithm for multiple S-boxes and a structured affine layer
- Invariant subspaces in SPN block cipher
- Constructions of rotation symmetric bent functions with high algebraic degree
- Affine equivalence and its application to tightening threshold implementations
- Affine equivalence of quartic homogeneous rotation symmetric Boolean functions
- Thinking outside the superbox
- Implicit white-box implementations: white-boxing ARX ciphers
- \( \otimes_{\mathcal{W}} \)-Markovianity of XSL-block ciphers connected with properties of their round functions
- On enumeration of polynomial equivalence classes
- Linear redundancy in S-boxes.
- Cryptographic analysis of all \(4 \times 4\)-bit s-boxes
- Cryptanalysis of two white-box implementations of the SM4 block cipher
- A Search Strategy to Optimize the Affine Variant Properties of S-Boxes
- Cryptographic properties of small bijective S-boxes with respect to modular addition
- Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem
- Pitfalls and shortcomings for decompositions and alignment
- Key Recovery on Hidden Monomial Multivariate Schemes
- Computing the number of affine equivalent classes on \(\mathcal{R}(s,n)/\mathcal{R}(k,n)\)
- On the classification of APN functions up to dimension five
- Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX)
- Circulant matrices and affine equivalence of monomial rotation symmetric Boolean functions
- Cryptanalysis of a Generic Class of White-Box Implementations
- On affine classification of permutations on the space \(\mathrm{GF}(2)^3\)
- Differential power analysis in Hamming weight model: how to choose among (extended) affine equivalent S-boxes
- On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks
- Structural cryptanalysis of SASAS
- Results on rotation-symmetric S-boxes
- About linear and affine equivalence of substitutions
- A linear equivalence algorithm
- Key-recovery attacks on \(\mathsf{ASASA}\)
- Cryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problem
- MRHS Equation Systems
- Analyzing the influence of linear redundancy in S-boxes on the affine equivalence within XSL-like round functions
- Computing the number of the equivalence classes for reversible logic functions
- A white-box speck implementation using self-equivalence encodings
- Deciding EA-equivalence via invariants
- Affine equivalence of quartic monomial rotation symmetric Boolean functions in prime power dimension
Uses Software
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4434867)