scientific article; zbMATH DE number 1455090
From MaRDI portal
Publication:4484885
Recommendations
Cited in
(only showing first 100 items - show all)- A new construction of differentially 4-uniform \((n,n-1)\)-functions
- On the differential uniformities of functions over finite fields
- Key Recovery on Hidden Monomial Multivariate Schemes
- Rigorous upper bounds on data complexities of block cipher cryptanalysis
- Differential experiments using parallel alternative operations
- Improbable differential attacks on \texttt{PRESENT} using undisturbed bits
- New criteria for linear maps in AES-like ciphers
- Collision attack on \({\mathtt Grindahl}\)
- On group rings and some of their applications to combinatorics and symmetric cryptography
- Massive superpoly recovery with nested monomial predictions
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields
- Constructing new differentially 4-uniform permutations from the inverse function
- scientific article; zbMATH DE number 1689593 (Why is no real title available?)
- Cryptanalysis results on spook. Bringing full-round shadow-512 to the light
- An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums
- On a generalization of substitution-permutation networks: the HADES design strategy
- Constructing differentially 4-uniform permutations over \(\mathrm{GF}(2^{2m})\) from quadratic APN permutations over \(\mathrm{GF}(2^{2m+1})\)
- Multiple differential cryptanalysis: theory and practice
- Improved meet-in-the-middle attacks on nine rounds of the AES-192 block cipher
- Improved differential meet-in-the-middle cryptanalysis
- Differential Forgery Attack Against LAC
- Probabilistic extensions: a one-step framework for finding rectangle attacks and beyond
- Generalized Feistel ciphers for efficient prime field masking
- Improved cryptanalysis of AES-like permutations
- Streebog compression function as PRF in secret-key settings
- Capability of evolutionary cryptosystems against differential cryptanalysis
- Algebraic key-recovery attacks on reduced-round Xoofff
- Another view of the division property
- Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher
- Internal differential collision attacks on the reduced-round Grøstl-0 hash function
- Serpent: a new block cipher proposal
- Format-preserving encryption algorithms using families of tweakable blockciphers
- More low differential uniformity permutations over \(\mathbb{F}_{2^{2 k}}\) with \(k\) odd
- Truncated differential cryptanalysis: new insights and application to \texttt{QARMAv1}-\(n\) and \texttt{QARMAv2}-64
- New approaches for estimating the bias of differential-linear distinguishers
- Integral distinguishers for reduced-round Stribog
- A methodology for differential-linear cryptanalysis and its applications
- Counting and characterising functions with ``fast points for differential attacks
- An algebraic attack on ciphers with low-degree round functions: application to full MiMC
- SQUARE attack on block ciphers with low algebraic degree
- From higher-order differentials to polytopic cryptyanalysis
- Accurate estimates of the data complexity and success probability for various cryptanalyses
- Orbital derivatives on residue rings. I: General properties
- Some instant- and practical-time related-key attacks on KTANTAN32/48/64
- Triplicate functions
- A theoretical analysis of generalized invariants of bijective S-boxes
- Distinguishing properties and applications of higher order derivatives of Boolean functions
- On the algebraic degree of iterated power functions
- Conditional Cube Searching and Applications on Trivium-Variant Ciphers
- Truncated differential properties of the diagonal set of inputs for 5-round AES
- Antiderivative functions over \(\mathbb{F}_{2^n}\)
- Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity
- Improving the security and efficiency of block ciphers based on LS-designs
- Observing biases in the state: case studies with Trivium and Trivia-SC
- Divide and rule: \textsf{DiFA} -- division property based fault attacks on \textsf{PRESENT} and \textsf{GIFT}
- On the properties of vectorial functions with plateaued components and their consequences on APN functions
- The interpolation attack on block ciphers
- Ghidle: efficient large-state block ciphers for post-quantum security
- The triangle differential cryptanalysis
- A new structural-differential property of 5-round AES
- Cryptographic weaknesses in the round transformation used in a block cipher with provable immunity against linear cryptanalysis
- The phantom of differential characteristics
- Constructing new differentially 4-uniform permutations from known ones
- Truncated differentials of SAFER
- New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers
- More constructions of APN and differentially 4-uniform functions by concatenation
- On the inverses of Kasami and Bracken-Leander exponents
- On the confusion and diffusion properties of Maiorana-McFarland's and extended Maiorana-McFarland's functions
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
- 3D: A Three-Dimensional Block Cipher
- On second-order derivatives of Boolean functions and cubic APN permutations in even dimension
- Partitioning cryptanalysis
- More differentially 6-uniform power functions
- A new family of differentially 4-uniform permutations over \(\mathbb{F}_{2^{2k}}\) for odd \(k\)
- Computing AES related-key differential characteristics with constraint programming
- Finding integral distinguishers with ease
- Differential attacks: using alternative operations
- Two notions of differential equivalence on Sboxes
- The rebound attack and subspace distinguishers: application to Whirlpool
- The block cipher \textsc{Square}
- Involutory differentially 4-uniform permutations from known constructions
- Can a differential attack work for an arbitrarily large number of rounds?
- Higher Order Derivatives and Differential Cryptanalysis
- Differential-multiple linear cryptanalysis
- Information-combining differential fault attacks on DEFAULT
- Differential cryptanalysis of round-reduced \texttt{SPEEDY} family
- Constructing 8-bit permutations, 8-bit involutions and 8-bit orthomorphisms with almost optimal cryptographic parameters
- Strong and tight security guarantees against integral distinguishers
- Higher Order Differential Attack of a CAST Cipher
- Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions
- On various nonlinearity measures for Boolean functions
- On relationship between the parameters characterizing nonlinearity and nonhomomorphy of vector spaces transformation
- The (related-key) impossible boomerang attack and its application to the AES block cipher
- scientific article; zbMATH DE number 1504540 (Why is no real title available?)
- Cryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato}
- Differential meet-in-the-middle cryptanalysis
- Layout graphs, random walks and the \(t\)-wise independence of SPN block ciphers
- SEA: A Scalable Encryption Algorithm for Small Embedded Applications
- Zero-sum distinguishers for iterated permutations and application to Keccak-\(f\) and Hamsi-256
- Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4484885)