New block encryption algorithm MISTY
From MaRDI portal
Publication:4639326
DOI10.1007/BFb0052334zbMath1385.94061MaRDI QIDQ4639326
Publication date: 9 May 2018
Published in: Fast Software Encryption (Search for Journal in Brave)
Related Items (40)
The key-dependent message security of key-alternating Feistel ciphers ⋮ Security evaluation of MISTY structure with SPN round function ⋮ Improved Cryptanalysis of the Block Cipher KASUMI ⋮ Integral Cryptanalysis on Full MISTY1 ⋮ The number of almost perfect nonlinear functions grows exponentially ⋮ Integral cryptanalysis on full MISTY1 ⋮ A further study on bridge structures and constructing bijective S-boxes for low-latency masking ⋮ Constructing infinite families of low differential uniformity (\(n,m\))-functions with \(m>n/2\) ⋮ What is the effective key length for a block cipher: an attack on every practical block cipher ⋮ A new construction of differentially 4-uniform \((n,n-1)\)-functions ⋮ A quantum distinguisher for 7/8-round SMS4 block cipher ⋮ Convexity of division property transitions: theory, algorithms and compact models ⋮ Massive superpoly recovery with nested monomial predictions ⋮ Applications of Simon's algorithm in quantum attacks on Feistel variants ⋮ Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers ⋮ On Lai-Massey and quasi-Feistel ciphers ⋮ Boomerang uniformity of popular S-box constructions ⋮ Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions ⋮ Classifying 8-Bit to 8-Bit S-Boxes Based on Power Mappings from the Point of DDT and LAT Distributions ⋮ Non-cryptographic primitive for pseudorandom permutation. ⋮ A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony ⋮ Practical-time attacks against reduced variants of~MISTY1 ⋮ CS-Cipher ⋮ Algebraic Insights into the Secret Feistel Network ⋮ Aperiodic propagation criteria for Boolean functions ⋮ An Improved Impossible Differential Attack on MISTY1 ⋮ Revisiting key schedule's diffusion in relation with round function's diffusion ⋮ Perfect nonlinear functions and cryptography ⋮ Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1 ⋮ Constructions of complete permutation polynomials ⋮ Construction of Lightweight S-Boxes Using Feistel and MISTY Structures ⋮ $\mathsf{XS}$-circuits in block ciphers ⋮ New classes of $8$-bit permutations based on a butterfly structure ⋮ Построение подстановок пространства $V_{2m}$ с использованием $(2m,m)$-функций ⋮ Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice ⋮ MISTY ⋮ New criteria for linear maps in AES-like ciphers ⋮ On Related-Key Attacks and KASUMI: The Case of A5/3 ⋮ A $$2^{70}$$ Attack on the Full MISTY1 ⋮ On the Role of Key Schedules in Attacks on Iterated Ciphers
Cites Work
This page was built for publication: New block encryption algorithm MISTY