scientific article; zbMATH DE number 1394292
From MaRDI portal
zbMATH Open0951.94519MaRDI QIDQ4934705FDOQ4934705
Authors: Mitsuru Matsui
Publication date: 31 January 2000
Title of this publication is not available (Why is that?)
Recommendations
Cited In (only showing first 100 items - show all)
- On the relationships between perfect nonlinear functions and universal hash families
- On the confusion and diffusion properties of Maiorana-McFarland's and extended Maiorana-McFarland's functions
- Partitioning cryptanalysis
- A new family of differentially 4-uniform permutations over \(\mathbb{F}_{2^{2k}}\) for odd \(k\)
- Towards the optimality of Feistel ciphers with substitution-permutation functions
- Zero-correlation linear cryptanalysis of reduced-round LBlock
- On the differential and linear efficiency of balanced Feistel networks
- Title not available (Why is that?)
- A construction of novel chaos base nonlinear component of block cipher
- Binomial differentially 4 uniform permutations with high nonlinearity
- SEA: A Scalable Encryption Algorithm for Small Embedded Applications
- Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions
- Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties
- Walsh transforms and cryptographic applications in bias computing
- Cryptographic properties and application of a generalized unbalanced Feistel network structure
- Impossible differential cryptanalysis using matrix method
- Nonlinearities of S-boxes
- New explicit constructions of differentially 4-uniform permutations via special partitions of \(\mathbb{F}_{2^{2 k}}\)
- An efficient encoding mechanism against eavesdropper with side channel information
- New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256
- Title not available (Why is that?)
- Algebraic Cryptanalysis of the Data Encryption Standard
- Differentially 4-uniform bijections by permuting the inverse function
- More constructions of differentially 4-uniform permutations on \(\mathbb {F}_{2^{2k}}\)
- Constructing new APN functions from known ones
- Cryptanalysis of an E0-like combiner with memory
- On construction of involutory MDS matrices from Vandermonde matrices in \(\mathrm{GF}(2^q)\)
- Another look at normal approximations in cryptanalysis
- An upper bound for the linearity of exponential Welch-Costas functions
- Highly nonlinear mappings
- On semi-bent functions with Niho exponents
- A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree
- Differential fault analysis on block cipher SEED
- Analysis of \(3\)-line generalized Feistel networks with double SD-functions
- Robust encryption, revisited
- Linear cryptanalysis of printcipher -- trails and samples everywhere
- Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time
- Higher-order nonlinearity of Kasami functions
- Breaking Grain-128 with dynamic cube attacks
- Cryptographic analysis of all \(4 \times 4\)-bit s-boxes
- On multiple output bent functions
- On EA-equivalence of certain permutations to power mappings
- On unbalanced feistel networks with contracting MDS diffusion
- Improving algorithm 2 in multidimensional (zero-correlation) linear cryptanalysis using \(\chi^2\)-method
- Relating three nonlinearity parameters of vectorial functions and building APN functions from bent functions
- Highly nonlinear balanced Boolean functions with good local and global avalanche characteristics.
- Title not available (Why is that?)
- On the differential uniformities of functions over finite fields
- On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2
- On group rings and some of their applications to combinatorics and symmetric cryptography
- Further properties of several classes of Boolean functions with optimum algebraic immunity
- AKF: a key alternating Feistel scheme for lightweight cipher designs
- Third-order nonlinearities of a subclass of Kasami functions
- Algorithm 959
- Distinguishing distributions using Chernoff information
- Constructing differentially 4-uniform permutations over \(\mathrm{GF}(2^{2m})\) from quadratic APN permutations over \(\mathrm{GF}(2^{2m+1})\)
- The designs of S-boxes by simulated annealing
- Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher
- Correlation theorems in cryptanalysis
- Evolutionary cryptography against multidimensional linear cryptanalysis
- On cross-correlation indicators of an S-box
- The DBlock family of block ciphers
- Serpent: a new block cipher proposal
- Practical security against linear cryptanalysis for SMS4-like ciphers with SP round function
- Results on rotation-symmetric S-boxes
- Accurate estimates of the data complexity and success probability for various cryptanalyses
- On probability of success in linear and differential cryptanalysis
- Linear Distinguishing Attack on Shannon
- LBlock: a lightweight block cipher
- On the Diffusion of Generalized Feistel Structures Regarding Differential and Linear Cryptanalysis
- The interpolation attack on block ciphers
- FPGA implementation of a statistical saturation attack against PRESENT
- Linear Approximations of Addition Modulo 2n-1
- Constructing new differentially 4-uniform permutations from known ones
- Measuring bias in cyclic random walks
- On quadratic approximations in block ciphers
- More constructions of APN and differentially 4-uniform functions by concatenation
- Linear hulls with correlation zero and linear cryptanalysis of block ciphers
- Construction of rotation symmetric Boolean functions with optimal algebraic immunity and high nonlinearity
- A geometric approach to linear cryptanalysis
- Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques
- The Cryptanalysis of Reduced-Round SMS4
- Security analysis of SIMECK block cipher against related-key impossible differential
- Chaotic S-box: intertwining logistic map and bacterial foraging optimization
- Classification of quadratic APN functions with coefficients in \(\mathbb{F}_2\) for dimensions up to 9
- On the EA-classes of known APN functions in small dimensions
- New links between nonlinearity and differential uniformity
- On CCZ-equivalence, extended-affine equivalence, and function twisting
- Connections among nonlinearity, avalanche and correlation immunity
- The design of composite permutations with applications to DES-like S-boxes
- Cryptanalysis of reduced NORX
- Solving the learning parity with noise's open question
- Regular subgroups with large intersection
- Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64
- A quantum blind signature scheme based on block encryption and quantum Fourier transfer
- Further study on the maximum number of bent components of vectorial functions
- Differential-linear and related key cryptanalysis of round-reduced scream
- Practical cryptanalysis of Bluetooth encryption with condition masking
- Masking tables -- an underestimated security risk
- Image cipher applications using the elliptical curve and chaos
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4934705)