New block encryption algorithm MISTY

From MaRDI portal
Publication:4639326

DOI10.1007/BFb0052334zbMath1385.94061MaRDI QIDQ4639326

Mitsuru Matsui

Publication date: 9 May 2018

Published in: Fast Software Encryption (Search for Journal in Brave)




Related Items (40)

The key-dependent message security of key-alternating Feistel ciphersSecurity evaluation of MISTY structure with SPN round functionImproved Cryptanalysis of the Block Cipher KASUMIIntegral Cryptanalysis on Full MISTY1The number of almost perfect nonlinear functions grows exponentiallyIntegral cryptanalysis on full MISTY1A further study on bridge structures and constructing bijective S-boxes for low-latency maskingConstructing infinite families of low differential uniformity (\(n,m\))-functions with \(m>n/2\)What is the effective key length for a block cipher: an attack on every practical block cipherA new construction of differentially 4-uniform \((n,n-1)\)-functionsA quantum distinguisher for 7/8-round SMS4 block cipherConvexity of division property transitions: theory, algorithms and compact modelsMassive superpoly recovery with nested monomial predictionsApplications of Simon's algorithm in quantum attacks on Feistel variantsMethods for Linear and Differential Cryptanalysis of Elastic Block CiphersOn Lai-Massey and quasi-Feistel ciphersBoomerang uniformity of popular S-box constructionsMind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitionsClassifying 8-Bit to 8-Bit S-Boxes Based on Power Mappings from the Point of DDT and LAT DistributionsNon-cryptographic primitive for pseudorandom permutation.A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephonyPractical-time attacks against reduced variants of~MISTY1CS-CipherAlgebraic Insights into the Secret Feistel NetworkAperiodic propagation criteria for Boolean functionsAn Improved Impossible Differential Attack on MISTY1Revisiting key schedule's diffusion in relation with round function's diffusionPerfect nonlinear functions and cryptographyImproving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1Constructions of complete permutation polynomialsConstruction of Lightweight S-Boxes Using Feistel and MISTY Structures$\mathsf{XS}$-circuits in block ciphersNew classes of $8$-bit permutations based on a butterfly structureПостроение подстановок пространства $V_{2m}$ с использованием $(2m,m)$-функцийCorrelation Power Analysis of Lightweight Block Ciphers: From Theory to PracticeMISTYNew criteria for linear maps in AES-like ciphersOn Related-Key Attacks and KASUMI: The Case of A5/3A $$2^{70}$$ Attack on the Full MISTY1On the Role of Key Schedules in Attacks on Iterated Ciphers



Cites Work


This page was built for publication: New block encryption algorithm MISTY