scientific article; zbMATH DE number 1394292
From MaRDI portal
Recommendations
Cited in
(only showing first 100 items - show all)- Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure
- On the relationships between perfect nonlinear functions and universal hash families
- More constructions of APN and differentially 4-uniform functions by concatenation
- Linear hulls with correlation zero and linear cryptanalysis of block ciphers
- Construction of rotation symmetric Boolean functions with optimal algebraic immunity and high nonlinearity
- Investigation of some cryptographic properties of the \(8 \times 8\) S-boxes created by quasigroups
- A framework to optimize implementations of matrices
- Zero-correlation linear cryptanalysis with equal treatment for plaintexts and tweakeys
- On the confusion and diffusion properties of Maiorana-McFarland's and extended Maiorana-McFarland's functions
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
- 3D: A Three-Dimensional Block Cipher
- Subgroups of direct products of groups invariant under the action of permutations on factors
- An STP-based model toward designing S-boxes with good cryptographic properties
- On nonlinearity of Boolean functions generated by the generalized Dobbertin construction
- Generalization of one method of a filter generator key recovery
- Generic attacks with standard deviation analysis on a-Feistel schemes
- Quantum differential and linear cryptanalysis
- Efficient chaotic encryption scheme with OFB mode
- Multi-objective optimisation of bijective S-boxes
- Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques
- A geometric approach to linear cryptanalysis
- Partitioning cryptanalysis
- Progress in Cryptology - INDOCRYPT 2004
- Towards the optimality of Feistel ciphers with substitution-permutation functions
- Zero-correlation linear cryptanalysis of reduced-round LBlock
- A new family of differentially 4-uniform permutations over \(\mathbb{F}_{2^{2k}}\) for odd \(k\)
- On the differential and linear efficiency of balanced Feistel networks
- The Cryptanalysis of Reduced-Round SMS4
- On related-key attacks and KASUMI: the case of A5/3
- A Super-Set of Patterson--Wiedemann Functions: Upper Bounds and Possible Nonlinearities
- CCZ-equivalence of bent vectorial functions and related constructions
- Wave-shaped round functions and primitive groups
- Identifying an unknown code by partial Gaussian elimination
- On a class of quadratic polynomials with no zeros and its application to APN functions
- Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent
- The block cipher \textsc{Square}
- Involutory differentially 4-uniform permutations from known constructions
- eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices
- Improving high-meets-low technique to generate odd-variable resilient Boolean functions with currently best nonlinearity
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- Weak-key distinguishers for AES
- WARP: revisiting GFN for lightweight 128-bit block cipher
- A note on some algebraic trapdoors for block ciphers
- Differential-multiple linear cryptanalysis
- Chaotic S-box: intertwining logistic map and bacterial foraging optimization
- Classification of quadratic APN functions with coefficients in \(\mathbb{F}_2\) for dimensions up to 9
- Security analysis of SIMECK block cipher against related-key impossible differential
- scientific article; zbMATH DE number 7310237 (Why is no real title available?)
- Generalized Hamming weights of linear codes from cryptographic functions
- Correlation power analysis of lightweight block ciphers: from theory to practice
- A construction of novel chaos base nonlinear component of block cipher
- Binomial differentially 4 uniform permutations with high nonlinearity
- On the EA-classes of known APN functions in small dimensions
- A tutorial on linear and differential cryptanalysis
- Statistical approximation theory for discrete functions with application in cryptanalysis of iterative block ciphers
- Toward the True Random Cipher: On Expected Linear Probability Values for SPNS with Randomly Selected S-Boxes
- On some connections between statistics and cryptology
- New links between nonlinearity and differential uniformity
- On CCZ-equivalence, extended-affine equivalence, and function twisting
- Experimental evaluation of book drawing algorithms
- Higher Order Differential Attack of a CAST Cipher
- Substitution box generation using chaos: an image encryption application
- FUTURE: a lightweight block cipher using an optimal diffusion matrix
- Linear and differential cryptanalysis: another viewpoint
- Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions
- Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties
- Walsh transforms and cryptographic applications in bias computing
- A related-key attack on iterated chaotic ciphers
- Non-asymptotic lower bounds for the data complexity of statistical attacks on symmetric cryptosystems
- Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses
- On relationship between the parameters characterizing nonlinearity and nonhomomorphy of vector spaces transformation
- Determining whether a given cryptographic function is a permutation of another given cryptographic function -- a problem in intellectual property
- RETRACTED: Fresnelet approach for image encryption in the algebraic frame
- The (related-key) impossible boomerang attack and its application to the AES block cipher
- Cryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato}
- Differential meet-in-the-middle cryptanalysis
- Moving a step of ChaCha in syncopated rhythm
- On perfect linear approximations and differentials over two-round SPNs
- Connections among nonlinearity, avalanche and correlation immunity
- SEA: A Scalable Encryption Algorithm for Small Embedded Applications
- Impossible Differential Cryptanalysis of CLEFIA
- Some results concerning cryptographically significant mappings over \(\text{GF}(2^{n})\)
- Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
- Related-Key Differential-Linear Attacks on Reduced AES-192
- Weak subtweakeys in SKINNY
- Cryptanalysis of the full 8.5-round REESSE3+ block cipher
- MixColumns coefficient property and security of the AES with a secret S-Box
- Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis
- A compress slide attack on the full GOST block cipher
- Improving key recovery to 784 and 799 rounds of Trivium using optimized cube attacks
- Some general properties of modified bent functions through addition of indicator functions
- On the algebraic construction of cryptographically good 32 32 binary linear transformations
- Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers
- Cryptographic properties and application of a generalized unbalanced Feistel network structure
- On the Link of Some Semi-bent Functions with Kloosterman Sums
- Evaluation and cryptanalysis of the Pandaka lightweight cipher
- Impossible differential cryptanalysis using matrix method
- Generalization of Matsui's Algorithm 1 to linear hull for key-alternating block ciphers
- Integral characteristics by keyspace partitioning
- Full round distinguishing and key-recovery attacks on SAND-2
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4934705)