scientific article; zbMATH DE number 1455090
From MaRDI portal
Publication:4484885
zbMath0939.94556MaRDI QIDQ4484885
Publication date: 5 June 2000
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
block cipherhigher-order differentialsdifferential attacktruncated differentialshigher-order derivatives of discrete functionsminimum nonlinear order
Related Items (only showing first 100 items - show all)
Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions ⋮ On various nonlinearity measures for Boolean functions ⋮ Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64 ⋮ Thinking outside the superbox ⋮ New explicit constructions of differentially 4-uniform permutations via special partitions of \(\mathbb{F}_{2^{2 k}}\) ⋮ Can a differential attack work for an arbitrarily large number of rounds? ⋮ Algebraic key-recovery attacks on reduced-round Xoofff ⋮ Another look at normal approximations in cryptanalysis ⋮ A new family of differentially 4-uniform permutations over \(\mathbb{F}_{2^{2k}}\) for odd \(k\) ⋮ The \(t\)-wise independence of substitution-permutation networks ⋮ SEA: A Scalable Encryption Algorithm for Small Embedded Applications ⋮ High order differential attacks on stream ciphers ⋮ Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE ⋮ Cryptanalysis of the permutation based algorithm SpoC ⋮ Counting active S-boxes is not enough ⋮ Computing expected differential probability of (truncated) differentials and expected linear potential of (multidimensional) linear hulls in SPN block ciphers ⋮ Upper bound of the length of truncated impossible differentials for AES ⋮ A method to calculate differential uniformity for permutations ⋮ Survey on recent trends towards generalized differential and boomerang uniformities ⋮ Aggregated differentials and cryptanalysis of PP-1 and GOST ⋮ Capability of evolutionary cryptosystems against differential cryptanalysis ⋮ Information-combining differential fault attacks on DEFAULT ⋮ Multiple (truncated) differential cryptanalysis: explicit upper bounds on data complexity ⋮ Differential-linear cryptanalysis revisited ⋮ Integral cryptanalysis on full MISTY1 ⋮ Rigorous upper bounds on data complexities of block cipher cryptanalysis ⋮ Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers ⋮ Masking Tables—An Underestimated Security Risk ⋮ On the Properties of Vectorial Functions with Plateaued Components and Their Consequences on APN Functions ⋮ Constructive Relationships Between Algebraic Thickness and Normality ⋮ On the security of multivariate hash functions ⋮ Cryptanalysis of Grindahl ⋮ More differentially 6-uniform power functions ⋮ Nonlinear Invariant Attack ⋮ A new construction of differentially 4-uniform \((n,n-1)\)-functions ⋮ More low differential uniformity permutations over \(\mathbb{F}_{2^{2 k}}\) with \(k\) odd ⋮ Simpira v2: A Family of Efficient Permutations Using the AES Round Function ⋮ Collision attack on \({\mathtt Grindahl}\) ⋮ Accurate estimates of the data complexity and success probability for various cryptanalyses ⋮ An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums ⋮ An algebraic attack on ciphers with low-degree round functions: application to full MiMC ⋮ On the algebraic degree of iterated power functions ⋮ Constructions with high algebraic degree of differentially 4-uniform \((n, n - 1)\)-functions and differentially 8-uniform \((n, n - 2)\)-functions ⋮ Constructing new differentially 4-uniform permutations from the inverse function ⋮ The phantom of differential characteristics ⋮ The higher-order meet-in-the-middle attack and its application to the Camellia block cipher ⋮ More constructions of APN and differentially 4-uniform functions by concatenation ⋮ On the differential uniformities of functions over finite fields ⋮ Internal differential collision attacks on the reduced-round Grøstl-0 hash function ⋮ On the inverses of Kasami and Bracken-Leander exponents ⋮ Integral distinguishers for reduced-round Stribog ⋮ Differentially low uniform permutations from known 4-uniform functions ⋮ Finding integral distinguishers with ease ⋮ Two notions of differential equivalence on Sboxes ⋮ Differential attacks: using alternative operations ⋮ Improved cryptanalysis of AES-like permutations ⋮ Low differentially uniform permutations from the Dobbertin APN function over \(\mathbb{F}_{2^n} \) ⋮ Partitioning cryptanalysis ⋮ The interpolation attack on block ciphers ⋮ The block cipher Square ⋮ Higher Order Differential Attack of a CAST Cipher ⋮ Serpent: A New Block Cipher Proposal ⋮ A methodology for differential-linear cryptanalysis and its applications ⋮ Differentially 4-uniform bijections by permuting the inverse function ⋮ Multiple Differential Cryptanalysis: Theory and Practice ⋮ Analysis of Reduced-SHAvite-3-256 v2 ⋮ Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function ⋮ Higher-Order Differential Properties of Keccak and Luffa ⋮ Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity ⋮ Observing biases in the state: case studies with Trivium and Trivia-SC ⋮ Antiderivative functions over \(\mathbb{F}_{2^n}\) ⋮ Improving the security and efficiency of block ciphers based on LS-designs ⋮ An improved degree evaluation method of NFSR-based cryptosystems ⋮ Constructing differentially 4-uniform permutations over \(\mathrm{GF}(2^{2m})\) from quadratic APN permutations over \(\mathrm{GF}(2^{2m+1})\) ⋮ Involutory differentially 4-uniform permutations from known constructions ⋮ The (related-key) impossible boomerang attack and its application to the AES block cipher ⋮ Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64 ⋮ Differential-Multiple Linear Cryptanalysis ⋮ Distinguishing properties and applications of higher order derivatives of Boolean functions ⋮ Computing AES related-key differential characteristics with constraint programming ⋮ An Improved Differential Attack on Full GOST ⋮ On the boomerang uniformity of some permutation polynomials ⋮ Differential Forgery Attack Against LAC ⋮ Разбиения на биграммах и марковость алгоритмов блочного шифрования ⋮ Многомерный линейный метод и показатели рассеивания линейной среды шифрпреобразований ⋮ Характеризация отображений через свойство неизометричности ⋮ Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256 ⋮ Constructing new differentially 4-uniform permutations from known ones ⋮ \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields ⋮ New criteria for linear maps in AES-like ciphers ⋮ Boomerang Distinguisher for the SIMD-512 Compression Function ⋮ New Insights on AES-Like SPN Ciphers ⋮ Another View of the Division Property ⋮ On the confusion and diffusion properties of Maiorana-McFarland's and extended Maiorana-McFarland's functions ⋮ On relationship between the parameters characterizing nonlinearity and nonhomomorphy of vector spaces transformation ⋮ On cryptographic propagation criteria for Boolean functions ⋮ Cryptanalysis results on spook. Bringing full-round shadow-512 to the light ⋮ The rebound attack and subspace distinguishers: application to Whirlpool ⋮ Improbable differential attacks on \texttt{PRESENT} using undisturbed bits ⋮ On a generalization of substitution-permutation networks: the HADES design strategy
This page was built for publication: