scientific article; zbMATH DE number 1394292
From MaRDI portal
zbMATH Open0951.94519MaRDI QIDQ4934705FDOQ4934705
Authors: Mitsuru Matsui
Publication date: 31 January 2000
Title of this publication is not available (Why is that?)
Recommendations
Cited In (only showing first 100 items - show all)
- A geometric approach to linear cryptanalysis
- Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques
- The Cryptanalysis of Reduced-Round SMS4
- Security analysis of SIMECK block cipher against related-key impossible differential
- Chaotic S-box: intertwining logistic map and bacterial foraging optimization
- Classification of quadratic APN functions with coefficients in \(\mathbb{F}_2\) for dimensions up to 9
- On the EA-classes of known APN functions in small dimensions
- On CCZ-equivalence, extended-affine equivalence, and function twisting
- Connections among nonlinearity, avalanche and correlation immunity
- The design of composite permutations with applications to DES-like S-boxes
- Solving the learning parity with noise's open question
- Masking Tables—An Underestimated Security Risk
- A Theoretical Study of Kolmogorov-Smirnov Distinguishers
- On the Diffusion Property of Iterated Functions
- Some Results on the Known Classes of Quadratic APN Functions
- Regular subgroups with large intersection
- Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64
- A quantum blind signature scheme based on block encryption and quantum Fourier transfer
- On known constructions of APN and AB functions and their relation to each other
- Further study on the maximum number of bent components of vectorial functions
- Differential-linear and related key cryptanalysis of round-reduced scream
- Practical cryptanalysis of Bluetooth encryption with condition masking
- Image cipher applications using the elliptical curve and chaos
- Improved differential-linear attacks with applications to ARX ciphers
- Improved differential-linear attacks with applications to ARX ciphers
- Fully automated differential-linear attacks against ARX ciphers
- Optimising linear key recovery attacks with affine Walsh transform pruning
- Efficient recursive diffusion layers for block ciphers and hash functions
- Constructing vectorial bent functions via second-order derivatives
- MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck
- On the Design and Security of RC2
- Generalized nonlinearity of \(S\)-boxes
- Distinguishing error of nonlinear invariant attacks
- Algebraic manipulation detection codes via highly nonlinear functions
- Cryptographic properties of small bijective S-boxes with respect to modular addition
- Security analysis of subterranean 2.0
- Changing APN functions at two points
- A new matrix form to generate all \(3\times 3\) involutory MDS matrices over \(\mathbb{F}_{2^m}\)
- Upper bounds for the average probabilities of difference characteristics of block ciphers with alternation of Markov transformations and generalized Markov transformations
- Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli}
- Improving key-recovery in linear attacks: application to 28-round PRESENT
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields
- Large scale, actively secure computation from LPN and free-XOR garbled circuits
- Rotational cryptanalysis from a differential-linear perspective. Practical distinguishers for round-reduced \texttt{FRIET}, \texttt{Xoodoo}, and \texttt{Alzette}
- Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX)
- On a generalization of substitution-permutation networks: the HADES design strategy
- Multiple encryption with minimum key
- Improved entropy bounds for parity filtered self-timed ring based random number generators
- Cryptanalysis of Reduced NORX
- Construction of balanced vectorial Boolean functions with almost optimal nonlinearity and very low differential-linear uniformity
- On the constructions of resilient Boolean functions with five-valued Walsh spectra and resilient semi-bent functions
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- Differential uniformity of the composition of two functions
- More low differential uniformity permutations over \(\mathbb{F}_{2^{2 k}}\) with \(k\) odd
- Rotational-linear attack: a new framework of cryptanalysis on ARX ciphers with applications to Chaskey
- An algebraic attack on ciphers with low-degree round functions: application to full MiMC
- Key-recovery attacks on \(\mathsf{ASASA}\)
- Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey
- Differential cryptanalysis in the fixed-key model
- Loiss: A Byte-Oriented Stream Cipher
- Investigation of some cryptographic properties of the \(8 \times 8\) S-boxes created by quasigroups
- A framework to optimize implementations of matrices
- Zero-correlation linear cryptanalysis with equal treatment for plaintexts and tweakeys
- Generic attacks with standard deviation analysis on a-Feistel schemes
- Involutory differentially 4-uniform permutations from known constructions
- Differential-multiple linear cryptanalysis
- A note on some algebraic trapdoors for block ciphers
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- Weak-key distinguishers for AES
- WARP: revisiting GFN for lightweight 128-bit block cipher
- Higher Order Differential Attack of a CAST Cipher
- FUTURE: a lightweight block cipher using an optimal diffusion matrix
- Substitution box generation using chaos: an image encryption application
- Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
- Related-Key Differential-Linear Attacks on Reduced AES-192
- Non-asymptotic lower bounds for the data complexity of statistical attacks on symmetric cryptosystems
- Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses
- Some results concerning cryptographically significant mappings over \(\text{GF}(2^{n})\)
- The (related-key) impossible boomerang attack and its application to the AES block cipher
- Some general properties of modified bent functions through addition of indicator functions
- Generalization of Matsui's Algorithm 1 to linear hull for key-alternating block ciphers
- Differentially low uniform permutations from known 4-uniform functions
- Simpira v2: A Family of Efficient Permutations Using the AES Round Function
- Connections between quaternary and Boolean bent functions
- Improving linear cryptanalysis of LOKI91 by probabilistic counting method
- Fast near collision attack on the Grain v1 stream cipher
- Differential-linear cryptanalysis revisited
- New slide attacks on almost self-similar ciphers
- On construction of correlation-immune functions via minimal functions
- Constructions of \(p\)-ary quadratic bent functions
- Hyper-bent functions and cyclic codes
- Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes
- If a generalised butterfly is APN then it operates on 6 bits
- A new construction of rotation symmetric Boolean functions with optimal algebraic immunity and higher nonlinearity
- A Unified Approach to Related-Key Attacks
- Steganography of capacity required using modulo operator for embedding secret image
- Troika: a ternary cryptographic hash function
- A Statistical Saturation Attack against the Block Cipher PRESENT
- Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks
- Linear and differential cryptanalysis: Another viewpoint
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4934705)