scientific article; zbMATH DE number 1394292
From MaRDI portal
Recommendations
Cited in
(only showing first 100 items - show all)- Construction of lightweight S-boxes using Feistel and MISTY structures
- Connections between quaternary and Boolean bent functions
- Differential-multiple linear cryptanalysis
- Reflection Cryptanalysis of Some Ciphers
- Lightweight multiplication in \(\mathrm{GF}(2^n)\) with applications to MDS matrices
- On Large Distributions for Linear Cryptanalysis
- Substitution-permutation networks resistant to differential and linear cryptanalysis
- A note on some algebraic trapdoors for block ciphers
- Group theoretic properties of Rijndael-like ciphers
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- Weak-key distinguishers for AES
- WARP: revisiting GFN for lightweight 128-bit block cipher
- A Unified Approach to Related-Key Attacks
- Generalization of Matsui's Algorithm 1 to linear hull for key-alternating block ciphers
- Generalization of a class of APN binomials to Gold-like functions
- Non abelian bent functions
- Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent
- Fast near collision attack on the Grain v1 stream cipher
- Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure
- Substitution box generation using chaos: an image encryption application
- Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem
- Differential-linear cryptanalysis revisited
- The block cipher \textsc{Square}
- Some results concerning cryptographically significant mappings over \(\text{GF}(2^{n})\)
- Investigation of some cryptographic properties of the \(8 \times 8\) S-boxes created by quasigroups
- Steganography of capacity required using modulo operator for embedding secret image
- Linear and differential cryptanalysis: another viewpoint
- The (related-key) impossible boomerang attack and its application to the AES block cipher
- A framework to optimize implementations of matrices
- Zero-correlation linear cryptanalysis with equal treatment for plaintexts and tweakeys
- Troika: a ternary cryptographic hash function
- scientific article; zbMATH DE number 7300318 (Why is no real title available?)
- Some remarks on the TKIP key mixing function of IEEE 802.11i
- If a generalised butterfly is APN then it operates on 6 bits
- SQUARE attack on block ciphers with low algebraic degree
- Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes
- Improving linear cryptanalysis of LOKI91 by probabilistic counting method
- scientific article; zbMATH DE number 1759275 (Why is no real title available?)
- Efficient slide attacks
- DES with any reduced masked rounds is not secure against side-channel attacks
- An overview of distinguishing attacks on stream ciphers
- Analyzing masked ciphers against transition and coupling effects
- New slide attacks on almost self-similar ciphers
- Improving key recovery to 784 and 799 rounds of Trivium using optimized cube attacks
- 3D: A Three-Dimensional Block Cipher
- An improvement of Davies' attack on DES
- Linear and differential cryptanalysis of Russian GOST
- A tutorial on linear and differential cryptanalysis
- Двойственность разностного и линейного методов в криптографии
- On Cryptographically Significant Mappings over GF(2 n )
- On construction of correlation-immune functions via minimal functions
- Differentially low uniform permutations from known 4-uniform functions
- On properties of translation groups in the affine general linear group with applications to cryptography
- Four decades of research on bent functions
- A Statistical Saturation Attack against the Block Cipher PRESENT
- Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
- Related-Key Differential-Linear Attacks on Reduced AES-192
- A new construction of rotation symmetric Boolean functions with optimal algebraic immunity and higher nonlinearity
- Hyper-bent functions and cyclic codes
- A Differential-Linear Attack on 12-Round Serpent
- CS-Cipher
- Some general properties of modified bent functions through addition of indicator functions
- Speeding up the search algorithm for the best differential and best linear trails
- A new counting method to bound the number of active S-boxes in Rijndael and 3D
- A methodology for differential-linear cryptanalysis and its applications
- Generic attacks with standard deviation analysis on a-Feistel schemes
- Higher Order Differential Attack of a CAST Cipher
- A generalized birthday approach for efficiently finding linear relations in \(\ell\)-sequences
- On the nonlinearity of S-boxes and linear codes
- Non-asymptotic lower bounds for the data complexity of statistical attacks on symmetric cryptosystems
- Constructions of \(p\)-ary quadratic bent functions
- Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity
- FUTURE: a lightweight block cipher using an optimal diffusion matrix
- Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses
- Improved Meet-in-the-Middle Attacks on Reduced-Round DES
- New differentially 4-uniform permutations by modifying the inverse function on subfields
- Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64
- Simpira v2: a family of efficient permutations using the AES round function
- Involutory differentially 4-uniform permutations from known constructions
- scientific article; zbMATH DE number 3793924 (Why is no real title available?)
- On quadratic approximations in block ciphers
- Results on rotation-symmetric S-boxes
- Accurate estimates of the data complexity and success probability for various cryptanalyses
- More constructions of differentially 4-uniform permutations on \(\mathbb {F}_{2^{2k}}\)
- Binomial differentially 4 uniform permutations with high nonlinearity
- Correlation theorems in cryptanalysis
- Relating three nonlinearity parameters of vectorial functions and building APN functions from bent functions
- Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions
- Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties
- Highly nonlinear mappings
- Constructing new APN functions from known ones
- Walsh transforms and cryptographic applications in bias computing
- On semi-bent functions with Niho exponents
- Breaking Grain-128 with dynamic cube attacks
- On the relationships between perfect nonlinear functions and universal hash families
- Cryptographic properties and application of a generalized unbalanced Feistel network structure
- Cryptanalysis of an E0-like combiner with memory
- Higher-order nonlinearity of Kasami functions
- Algorithm 959
- The DBlock family of block ciphers
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4934705)