scientific article; zbMATH DE number 1394292
From MaRDI portal
Recommendations
Cited in
(only showing first 100 items - show all)- Improved entropy bounds for parity filtered self-timed ring based random number generators
- Upper bounds for the average probabilities of difference characteristics of block ciphers with alternation of Markov transformations and generalized Markov transformations
- New links between nonlinearity and differential uniformity
- On CCZ-equivalence, extended-affine equivalence, and function twisting
- Algebraic manipulation detection codes via highly nonlinear functions
- Cryptographic properties of small bijective S-boxes with respect to modular addition
- Security analysis of subterranean 2.0
- Connections among nonlinearity, avalanche and correlation immunity
- Constructing vectorial bent functions via second-order derivatives
- On known constructions of APN and AB functions and their relation to each other
- Rotational-linear attack: a new framework of cryptanalysis on ARX ciphers with applications to Chaskey
- A geometric approach to linear cryptanalysis
- Solving the learning parity with noise's open question
- Security analysis of SIMECK block cipher against related-key impossible differential
- Chaotic S-box: intertwining logistic map and bacterial foraging optimization
- Classification of quadratic APN functions with coefficients in \(\mathbb{F}_2\) for dimensions up to 9
- Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli}
- Changing APN functions at two points
- Efficient recursive diffusion layers for block ciphers and hash functions
- Automatic search of linear trails in ARX with applications to SPECK and Chaskey
- Improving key-recovery in linear attacks: application to 28-round PRESENT
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields
- Large scale, actively secure computation from LPN and free-XOR garbled circuits
- Rotational cryptanalysis from a differential-linear perspective. Practical distinguishers for round-reduced \texttt{FRIET}, \texttt{Xoodoo}, and \texttt{Alzette}
- Masking tables -- an underestimated security risk
- MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck
- An algebraic attack on ciphers with low-degree round functions: application to full MiMC
- Optimising linear key recovery attacks with affine Walsh transform pruning
- A theoretical study of Kolmogorov-Smirnov distinguishers
- Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques
- Image cipher applications using the elliptical curve and chaos
- A new matrix form to generate all \(3\times 3\) involutory MDS matrices over \(\mathbb{F}_{2^m}\)
- Fully automated differential-linear attacks against ARX ciphers
- Construction of balanced vectorial Boolean functions with almost optimal nonlinearity and very low differential-linear uniformity
- Improved differential-linear attacks with applications to ARX ciphers
- Improved differential-linear attacks with applications to ARX ciphers
- Differential cryptanalysis in the fixed-key model
- The design of composite permutations with applications to DES-like S-boxes
- On the EA-classes of known APN functions in small dimensions
- Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX)
- Differential uniformity of the composition of two functions
- On the constructions of resilient Boolean functions with five-valued Walsh spectra and resilient semi-bent functions
- On the diffusion property of iterated functions
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- Key-recovery attacks on \(\mathsf{ASASA}\)
- On the design and security of RC2
- Some results on the known classes of quadratic APN functions
- The Cryptanalysis of Reduced-Round SMS4
- On a generalization of substitution-permutation networks: the HADES design strategy
- Regular subgroups with large intersection
- Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64
- A quantum blind signature scheme based on block encryption and quantum Fourier transfer
- Generalized nonlinearity of \(S\)-boxes
- Loiss: A Byte-Oriented Stream Cipher
- Differential-linear and related key cryptanalysis of round-reduced scream
- Practical cryptanalysis of Bluetooth encryption with condition masking
- Distinguishing error of nonlinear invariant attacks
- Multiple encryption with minimum key
- Cryptanalysis of reduced NORX
- Further study on the maximum number of bent components of vectorial functions
- On quadratic approximations in block ciphers
- Results on rotation-symmetric S-boxes
- Accurate estimates of the data complexity and success probability for various cryptanalyses
- More constructions of differentially 4-uniform permutations on \(\mathbb {F}_{2^{2k}}\)
- Binomial differentially 4 uniform permutations with high nonlinearity
- Correlation theorems in cryptanalysis
- Relating three nonlinearity parameters of vectorial functions and building APN functions from bent functions
- Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions
- Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties
- Highly nonlinear mappings
- Constructing new APN functions from known ones
- Walsh transforms and cryptographic applications in bias computing
- On semi-bent functions with Niho exponents
- Breaking Grain-128 with dynamic cube attacks
- On the relationships between perfect nonlinear functions and universal hash families
- Cryptographic properties and application of a generalized unbalanced Feistel network structure
- Cryptanalysis of an E0-like combiner with memory
- Higher-order nonlinearity of Kasami functions
- Algorithm 959
- The DBlock family of block ciphers
- On the confusion and diffusion properties of Maiorana-McFarland's and extended Maiorana-McFarland's functions
- On construction of involutory MDS matrices from Vandermonde matrices in \(\mathrm{GF}(2^q)\)
- Cryptographic analysis of all \(4 \times 4\)-bit s-boxes
- Nonlinearities of S-boxes
- Serpent: a new block cipher proposal
- New explicit constructions of differentially 4-uniform permutations via special partitions of \(\mathbb{F}_{2^{2 k}}\)
- Robust encryption, revisited
- On the differential uniformities of functions over finite fields
- A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree
- scientific article; zbMATH DE number 3952651 (Why is no real title available?)
- LBlock: a lightweight block cipher
- Impossible differential cryptanalysis using matrix method
- Towards the optimality of Feistel ciphers with substitution-permutation functions
- Zero-correlation linear cryptanalysis of reduced-round LBlock
- Linear cryptanalysis of printcipher -- trails and samples everywhere
- Evolutionary cryptography against multidimensional linear cryptanalysis
- On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2
- On cross-correlation indicators of an S-box
- Differential fault analysis on block cipher SEED
- A construction of novel chaos base nonlinear component of block cipher
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4934705)