scientific article; zbMATH DE number 1394292
From MaRDI portal
zbMATH Open0951.94519MaRDI QIDQ4934705FDOQ4934705
Authors: Mitsuru Matsui
Publication date: 31 January 2000
Title of this publication is not available (Why is that?)
Recommendations
Cited In (only showing first 100 items - show all)
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
- An STP-based model toward designing S-boxes with good cryptographic properties
- Multi-objective optimisation of bijective S-boxes
- CCZ-equivalence of bent vectorial functions and related constructions
- Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent
- On a class of quadratic polynomials with no zeros and its application to APN functions
- Wave-shaped round functions and primitive groups
- Identifying an unknown code by partial Gaussian elimination
- Generalized Hamming weights of linear codes from cryptographic functions
- Correlation power analysis of lightweight block ciphers: from theory to practice
- Experimental evaluation of book drawing algorithms
- Impossible Differential Cryptanalysis of CLEFIA
- Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis
- On the algebraic construction of cryptographically good \(32 \times 32\) binary linear transformations
- On the Link of Some Semi-bent Functions with Kloosterman Sums
- Affine equivalence in the AES round function
- Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers
- Integral cryptanalysis on full MISTY1
- RAMus- a new lightweight block cipher for RAM encryption
- Constructions of rotation symmetric bent functions with high algebraic degree
- On differential uniformity and nonlinearity of functions
- Multidimensional linear cryptanalysis
- Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers
- On the degree of homogeneous bent functions
- The Complexity of Distinguishing Distributions (Invited Talk)
- Evolutionary computation based cryptanalysis: a first study
- Upper bound of the length of truncated impossible differentials for AES
- Homomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more data
- The Missing Difference problem, and its applications to counter mode encryption
- Differential and linear cryptanalysis for 2-round spns
- Zero-correlation attacks: statistical models independent of the number of approximations
- New observations on invariant subspace attack
- Constructions with high algebraic degree of differentially 4-uniform \((n, n - 1)\)-functions and differentially 8-uniform \((n, n - 2)\)-functions
- How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps.
- New insights on AES-like SPN ciphers
- Quantum differential cryptanalysis
- Impossible differential cryptanalysis and integral cryptanalysis of the ACE-class permutation
- Pseudorandom functions: three decades later
- Randomness and Representation of Span n Sequences
- A new construction of differentially 4-uniform \((n,n-1)\)-functions
- A construction of bent functions of \(n+2\) variables from a bent function of \(n\) variables and its cyclic shifts
- Rigorous upper bounds on data complexities of block cipher cryptanalysis
- Primitivity of PRESENT and other lightweight ciphers
- A randomness test for block ciphers
- A matrix construction of Boolean functions with maximum algebraic immunity
- Linear cryptanalysis of reduced-round SPECK
- The cryptanalysis of FEAL-4 with 20 chosen plaintexts
- Resistance of balanced s-boxes to linear and differential cryptanalysis
- Fast S-box security mechanism research based on the polymorphic cipher
- On constructions and properties of \((n,m)\)-functions with maximal number of bent components
- Linear cryptanalysis of FF3-1 and FEA
- Improved differential-linear attack with application to round-reduced Speck32/64
- Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE
- Highly nonlinear balanced S-boxes with improved bound on unrestricted and generalized nonlinearity
- On the properties of vectorial functions with plateaued components and their consequences on APN functions
- Completely characterizing a class of permutation quadrinomials
- The Carlitz rank of permutations of finite fields: a survey
- On \(q\)-nearly bent Boolean functions
- Investigation for 8-bit \textsc{SKINNY}-like S-boxes, analysis and applications
- Differential attack on five rounds of the SC2000 block cipher
- Differential uniformity and linearity of S-boxes by multiplicative complexity
- A quadratic part of a bent function can be any
- Improved Feistel-based ciphers for wireless sensor network security
- Quantum differential and linear cryptanalysis
- On the relationships between perfect nonlinear functions and universal hash families
- On the confusion and diffusion properties of Maiorana-McFarland's and extended Maiorana-McFarland's functions
- Partitioning cryptanalysis
- A new family of differentially 4-uniform permutations over \(\mathbb{F}_{2^{2k}}\) for odd \(k\)
- Towards the optimality of Feistel ciphers with substitution-permutation functions
- Zero-correlation linear cryptanalysis of reduced-round LBlock
- On the differential and linear efficiency of balanced Feistel networks
- Title not available (Why is that?)
- A construction of novel chaos base nonlinear component of block cipher
- Binomial differentially 4 uniform permutations with high nonlinearity
- SEA: A Scalable Encryption Algorithm for Small Embedded Applications
- Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions
- Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties
- Walsh transforms and cryptographic applications in bias computing
- Cryptographic properties and application of a generalized unbalanced Feistel network structure
- Impossible differential cryptanalysis using matrix method
- Nonlinearities of S-boxes
- New explicit constructions of differentially 4-uniform permutations via special partitions of \(\mathbb{F}_{2^{2 k}}\)
- An efficient encoding mechanism against eavesdropper with side channel information
- New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256
- Title not available (Why is that?)
- Algebraic Cryptanalysis of the Data Encryption Standard
- Differentially 4-uniform bijections by permuting the inverse function
- More constructions of differentially 4-uniform permutations on \(\mathbb {F}_{2^{2k}}\)
- Constructing new APN functions from known ones
- Cryptanalysis of an E0-like combiner with memory
- On construction of involutory MDS matrices from Vandermonde matrices in \(\mathrm{GF}(2^q)\)
- Another look at normal approximations in cryptanalysis
- An upper bound for the linearity of exponential Welch-Costas functions
- Highly nonlinear mappings
- On semi-bent functions with Niho exponents
- A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree
- Differential fault analysis on block cipher SEED
- Analysis of \(3\)-line generalized Feistel networks with double SD-functions
- Robust encryption, revisited
- Linear cryptanalysis of printcipher -- trails and samples everywhere
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4934705)