scientific article; zbMATH DE number 1455090
From MaRDI portal
Publication:4484885
Recommendations
Cited in
(only showing first 100 items - show all)- More constructions of APN and differentially 4-uniform functions by concatenation
- On the inverses of Kasami and Bracken-Leander exponents
- On the confusion and diffusion properties of Maiorana-McFarland's and extended Maiorana-McFarland's functions
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
- 3D: A Three-Dimensional Block Cipher
- On second-order derivatives of Boolean functions and cubic APN permutations in even dimension
- Partitioning cryptanalysis
- More differentially 6-uniform power functions
- A new family of differentially 4-uniform permutations over \(\mathbb{F}_{2^{2k}}\) for odd \(k\)
- Computing AES related-key differential characteristics with constraint programming
- Finding integral distinguishers with ease
- Differential attacks: using alternative operations
- Two notions of differential equivalence on Sboxes
- The rebound attack and subspace distinguishers: application to Whirlpool
- The block cipher \textsc{Square}
- Involutory differentially 4-uniform permutations from known constructions
- Can a differential attack work for an arbitrarily large number of rounds?
- Higher Order Derivatives and Differential Cryptanalysis
- Differential-multiple linear cryptanalysis
- Information-combining differential fault attacks on DEFAULT
- Differential cryptanalysis of round-reduced \texttt{SPEEDY} family
- Constructing 8-bit permutations, 8-bit involutions and 8-bit orthomorphisms with almost optimal cryptographic parameters
- Strong and tight security guarantees against integral distinguishers
- Higher Order Differential Attack of a CAST Cipher
- Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions
- On various nonlinearity measures for Boolean functions
- On relationship between the parameters characterizing nonlinearity and nonhomomorphy of vector spaces transformation
- The (related-key) impossible boomerang attack and its application to the AES block cipher
- scientific article; zbMATH DE number 1504540 (Why is no real title available?)
- Cryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato}
- Differential meet-in-the-middle cryptanalysis
- Layout graphs, random walks and the \(t\)-wise independence of SPN block ciphers
- SEA: A Scalable Encryption Algorithm for Small Embedded Applications
- Zero-sum distinguishers for iterated permutations and application to Keccak-\(f\) and Hamsi-256
- Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
- Cryptanalysis of the permutation based algorithm SpoC
- Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006
- Differentially low uniform permutations from known 4-uniform functions
- New explicit constructions of differentially 4-uniform permutations via special partitions of \(\mathbb{F}_{2^{2 k}}\)
- On the security of multivariate hash functions
- Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64
- Integral cryptanalysis on full MISTY1
- Low differentially uniform permutations from the Dobbertin APN function over \(\mathbb{F}_{2^n} \)
- High order differential attacks on stream ciphers
- Packed ciphertexts in LWE-based homomorphic encryption
- Differential-linear cryptanalysis revisited
- Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
- Differentially 4-uniform bijections by permuting the inverse function
- Related-key attacks on the compression function of Streebog
- And Rijndael? Automatic related-key differential analysis of Rijndael
- Thinking outside the superbox
- More constructions of differentially 4-uniform permutations on \(\mathbb {F}_{2^{2k}}\)
- Boomerang Distinguisher for the SIMD-512 Compression Function
- An improved differential attack on full GOST
- Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64
- Simpira v2: a family of efficient permutations using the AES round function
- Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE
- Another look at normal approximations in cryptanalysis
- Masking tables -- an underestimated security risk
- Bit-based division property and application to \textsc{Simon} family
- Cryptanalysis of Grindahl
- On the boomerang uniformity of some permutation polynomials
- An improved degree evaluation method of NFSR-based cryptosystems
- Revisiting higher-order differential-linear attacks from an algebraic perspective
- The retracing boomerang attack, with application to reduced-round AES
- Difference characteristics of random maps and their compositions
- On a relationship between linear and differential characteristics of binary vector spaces mappings and diffusion characteristics over blocks of imprimitivity systems of translation group of the binary vector space
- On the structure of Skipjack
- Full round zero-sum distinguishers on \textsf{TinyJAMBU}-128 and \textsf{TinyJAMBU}-192 keyed-permutation in the known-key setting
- Linear Cryptanalysis of Non Binary Ciphers
- Analysis of Reduced-SHAvite-3-256 v2
- The \(t\)-wise independence of substitution-permutation networks
- Partitions on bigrams and Markov property of block ciphers
- Multidimensional linear method and diffusion characteristics of linear medium of ciphering transform
- Cryptanalysis of Ciminion
- New Related-Key Boomerang Attacks on AES
- Aggregated differentials and cryptanalysis of PP-1 and GOST
- A method to calculate differential uniformity for permutations
- Upper bound of the length of truncated impossible differentials for AES
- Factor structures of transformations
- Multiple (truncated) differential cryptanalysis: explicit upper bounds on data complexity
- Higher-order differential properties of Keccak and Luffa
- On cryptographic propagation criteria for Boolean functions
- scientific article; zbMATH DE number 7300352 (Why is no real title available?)
- Constructions with high algebraic degree of differentially 4-uniform \((n, n - 1)\)-functions and differentially 8-uniform \((n, n - 2)\)-functions
- ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES
- Constructive relationships between algebraic thickness and normality
- \textsc{Poseidon}2: a faster version of the \textsc{Poseidon} hash function
- Automated truncation of differential trails and trail clustering in ARX
- ACE-HoT: \underline{A}ccelerating an extreme amount of symmetric \underline{C}ipher \underline{E}valuations for (\underline{H}igh-\underline{o}rder) avalanche \underline{T}ests
- New insights on AES-like SPN ciphers
- Computing expected differential probability of (truncated) differentials and expected linear potential of (multidimensional) linear hulls in SPN block ciphers
- Counting active S-boxes is not enough
- Survey on recent trends towards generalized differential and boomerang uniformities
- Differential attacks on reduced round LILLIPUT
- Mathematical aspects of division property
- A CP-based automatic tool for instantiating truncated differential characteristics
- Falling into bytes and pieces -- cryptanalysis of an Apple patent application
- Quantum algorithms related to \(HN\)-transforms of Boolean functions
- Characterization of mappings by the nonisometricity property
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4484885)