scientific article; zbMATH DE number 1455090
From MaRDI portal
Publication:4484885
zbMATH Open0939.94556MaRDI QIDQ4484885FDOQ4484885
Authors: Lars R. Knudsen
Publication date: 5 June 2000
Title of this publication is not available (Why is that?)
Recommendations
block cipherdifferential attackhigher-order differentialstruncated differentialshigher-order derivatives of discrete functionsminimum nonlinear order
Cited In (only showing first 100 items - show all)
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
- On the confusion and diffusion properties of Maiorana-McFarland's and extended Maiorana-McFarland's functions
- Partitioning cryptanalysis
- A new family of differentially 4-uniform permutations over \(\mathbb{F}_{2^{2k}}\) for odd \(k\)
- The block cipher \textsc{Square}
- The rebound attack and subspace distinguishers: application to Whirlpool
- More differentially 6-uniform power functions
- Higher Order Derivatives and Differential Cryptanalysis
- Involutory differentially 4-uniform permutations from known constructions
- Differential-multiple linear cryptanalysis
- Can a differential attack work for an arbitrarily large number of rounds?
- Higher Order Differential Attack of a CAST Cipher
- Title not available (Why is that?)
- Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
- SEA: A Scalable Encryption Algorithm for Small Embedded Applications
- Zero-sum distinguishers for iterated permutations and application to Keccak-\(f\) and Hamsi-256
- Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions
- On various nonlinearity measures for Boolean functions
- The (related-key) impossible boomerang attack and its application to the AES block cipher
- Differentially low uniform permutations from known 4-uniform functions
- New explicit constructions of differentially 4-uniform permutations via special partitions of \(\mathbb{F}_{2^{2 k}}\)
- On the security of multivariate hash functions
- Packed ciphertexts in LWE-based homomorphic encryption
- High order differential attacks on stream ciphers
- Differential-linear cryptanalysis revisited
- Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
- Differentially 4-uniform bijections by permuting the inverse function
- More constructions of differentially 4-uniform permutations on \(\mathbb {F}_{2^{2k}}\)
- An improved differential attack on full GOST
- Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64
- Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE
- Simpira v2: a family of efficient permutations using the AES round function
- Bit-based division property and application to \textsc{Simon} family
- Cryptanalysis of Grindahl
- Another look at normal approximations in cryptanalysis
- On the boomerang uniformity of some permutation polynomials
- Linear Cryptanalysis of Non Binary Ciphers
- Cryptanalysis of Ciminion
- Aggregated differentials and cryptanalysis of PP-1 and GOST
- A method to calculate differential uniformity for permutations
- Upper bound of the length of truncated impossible differentials for AES
- Multiple (truncated) differential cryptanalysis: explicit upper bounds on data complexity
- Higher-order differential properties of Keccak and Luffa
- On cryptographic propagation criteria for Boolean functions
- Constructive relationships between algebraic thickness and normality
- New insights on AES-like SPN ciphers
- Characterization of mappings by the nonisometricity property
- Key Recovery on Hidden Monomial Multivariate Schemes
- On the differential uniformities of functions over finite fields
- A new construction of differentially 4-uniform \((n,n-1)\)-functions
- On group rings and some of their applications to combinatorics and symmetric cryptography
- Improbable differential attacks on \texttt{PRESENT} using undisturbed bits
- New criteria for linear maps in AES-like ciphers
- Collision attack on \({\mathtt Grindahl}\)
- Constructing new differentially 4-uniform permutations from the inverse function
- Multiple differential cryptanalysis: theory and practice
- Constructing differentially 4-uniform permutations over \(\mathrm{GF}(2^{2m})\) from quadratic APN permutations over \(\mathrm{GF}(2^{2m+1})\)
- Improved cryptanalysis of AES-like permutations
- Capability of evolutionary cryptosystems against differential cryptanalysis
- Algebraic key-recovery attacks on reduced-round Xoofff
- Serpent: a new block cipher proposal
- Internal differential collision attacks on the reduced-round Grøstl-0 hash function
- SQUARE attack on block ciphers with low algebraic degree
- Orbital derivatives on residue rings. I: General properties
- A methodology for differential-linear cryptanalysis and its applications
- Counting and characterising functions with ``fast points for differential attacks
- Accurate estimates of the data complexity and success probability for various cryptanalyses
- Distinguishing properties and applications of higher order derivatives of Boolean functions
- Antiderivative functions over \(\mathbb{F}_{2^n}\)
- Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity
- Improving the security and efficiency of block ciphers based on LS-designs
- Observing biases in the state: case studies with Trivium and Trivia-SC
- On the properties of vectorial functions with plateaued components and their consequences on APN functions
- The interpolation attack on block ciphers
- A new structural-differential property of 5-round AES
- Constructing new differentially 4-uniform permutations from known ones
- 3D: A Three-Dimensional Block Cipher
- More constructions of APN and differentially 4-uniform functions by concatenation
- On the inverses of Kasami and Bracken-Leander exponents
- On second-order derivatives of Boolean functions and cubic APN permutations in even dimension
- Computing AES related-key differential characteristics with constraint programming
- Finding integral distinguishers with ease
- Differential attacks: using alternative operations
- Two notions of differential equivalence on Sboxes
- Differential cryptanalysis of round-reduced \texttt{SPEEDY} family
- Strong and tight security guarantees against integral distinguishers
- Constructing 8-bit permutations, 8-bit involutions and 8-bit orthomorphisms with almost optimal cryptographic parameters
- Information-combining differential fault attacks on DEFAULT
- Cryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato}
- Differential meet-in-the-middle cryptanalysis
- Layout graphs, random walks and the \(t\)-wise independence of SPN block ciphers
- On relationship between the parameters characterizing nonlinearity and nonhomomorphy of vector spaces transformation
- Cryptanalysis of the permutation based algorithm SpoC
- Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006
- Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64
- Integral cryptanalysis on full MISTY1
- Low differentially uniform permutations from the Dobbertin APN function over \(\mathbb{F}_{2^n} \)
- Related-key attacks on the compression function of Streebog
- And Rijndael? Automatic related-key differential analysis of Rijndael
- Boomerang Distinguisher for the SIMD-512 Compression Function
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4484885)