scientific article; zbMATH DE number 1394292
From MaRDI portal
Recommendations
Cited in
(only showing first 100 items - show all)- The Complexity of Distinguishing Distributions (Invited Talk)
- On \(q\)-nearly bent Boolean functions
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
- Randomness and Representation of Span n Sequences
- A quadratic part of a bent function can be any
- On differential uniformity and nonlinearity of functions
- The cryptanalysis of FEAL-4 with 20 chosen plaintexts
- How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps.
- CCZ-equivalence of bent vectorial functions and related constructions
- Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent
- New insights on AES-like SPN ciphers
- Constructions of rotation symmetric bent functions with high algebraic degree
- On a class of quadratic polynomials with no zeros and its application to APN functions
- Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE
- Multidimensional linear cryptanalysis
- On the properties of vectorial functions with plateaued components and their consequences on APN functions
- Improved Feistel-based ciphers for wireless sensor network security
- Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis
- Linear cryptanalysis of reduced-round SPECK
- An STP-based model toward designing S-boxes with good cryptographic properties
- Wave-shaped round functions and primitive groups
- Correlation power analysis of lightweight block ciphers: from theory to practice
- Identifying an unknown code by partial Gaussian elimination
- Zero-correlation attacks: statistical models independent of the number of approximations
- New observations on invariant subspace attack
- Fast S-box security mechanism research based on the polymorphic cipher
- Evolutionary computation based cryptanalysis: a first study
- Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers
- Investigation for 8-bit \textsc{SKINNY}-like S-boxes, analysis and applications
- A new construction of differentially 4-uniform \((n,n-1)\)-functions
- A construction of bent functions of \(n+2\) variables from a bent function of \(n\) variables and its cyclic shifts
- On the degree of homogeneous bent functions
- Primitivity of PRESENT and other lightweight ciphers
- Completely characterizing a class of permutation quadrinomials
- Upper bound of the length of truncated impossible differentials for AES
- Homomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more data
- The Missing Difference problem, and its applications to counter mode encryption
- Differential attack on five rounds of the SC2000 block cipher
- Improved differential-linear attack with application to round-reduced Speck32/64
- Experimental evaluation of book drawing algorithms
- A randomness test for block ciphers
- Resistance of balanced s-boxes to linear and differential cryptanalysis
- On the algebraic construction of cryptographically good \(32 \times 32\) binary linear transformations
- Pseudorandom functions: three decades later
- The Carlitz rank of permutations of finite fields: a survey
- Multi-objective optimisation of bijective S-boxes
- Generalized Hamming weights of linear codes from cryptographic functions
- Differential uniformity and linearity of S-boxes by multiplicative complexity
- RAMus- a new lightweight block cipher for RAM encryption
- Constructions with high algebraic degree of differentially 4-uniform \((n, n - 1)\)-functions and differentially 8-uniform \((n, n - 2)\)-functions
- Differential and linear cryptanalysis for 2-round spns
- Highly nonlinear balanced S-boxes with improved bound on unrestricted and generalized nonlinearity
- Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers
- On constructions and properties of \((n,m)\)-functions with maximal number of bent components
- Quantum differential cryptanalysis
- On the Link of Some Semi-bent Functions with Kloosterman Sums
- Impossible Differential Cryptanalysis of CLEFIA
- Affine equivalence in the AES round function
- Impossible differential cryptanalysis and integral cryptanalysis of the ACE-class permutation
- Linear cryptanalysis of FF3-1 and FEA
- A matrix construction of Boolean functions with maximum algebraic immunity
- Integral cryptanalysis on full MISTY1
- Rigorous upper bounds on data complexities of block cipher cryptanalysis
- Quantum differential and linear cryptanalysis
- Improved entropy bounds for parity filtered self-timed ring based random number generators
- Upper bounds for the average probabilities of difference characteristics of block ciphers with alternation of Markov transformations and generalized Markov transformations
- New links between nonlinearity and differential uniformity
- On CCZ-equivalence, extended-affine equivalence, and function twisting
- Algebraic manipulation detection codes via highly nonlinear functions
- Cryptographic properties of small bijective S-boxes with respect to modular addition
- Security analysis of subterranean 2.0
- Connections among nonlinearity, avalanche and correlation immunity
- Constructing vectorial bent functions via second-order derivatives
- On known constructions of APN and AB functions and their relation to each other
- Rotational-linear attack: a new framework of cryptanalysis on ARX ciphers with applications to Chaskey
- A geometric approach to linear cryptanalysis
- Solving the learning parity with noise's open question
- Security analysis of SIMECK block cipher against related-key impossible differential
- Chaotic S-box: intertwining logistic map and bacterial foraging optimization
- Classification of quadratic APN functions with coefficients in \(\mathbb{F}_2\) for dimensions up to 9
- Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli}
- Changing APN functions at two points
- Efficient recursive diffusion layers for block ciphers and hash functions
- Automatic search of linear trails in ARX with applications to SPECK and Chaskey
- Improving key-recovery in linear attacks: application to 28-round PRESENT
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields
- Large scale, actively secure computation from LPN and free-XOR garbled circuits
- Rotational cryptanalysis from a differential-linear perspective. Practical distinguishers for round-reduced \texttt{FRIET}, \texttt{Xoodoo}, and \texttt{Alzette}
- Masking tables -- an underestimated security risk
- MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck
- An algebraic attack on ciphers with low-degree round functions: application to full MiMC
- Optimising linear key recovery attacks with affine Walsh transform pruning
- A theoretical study of Kolmogorov-Smirnov distinguishers
- Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques
- Image cipher applications using the elliptical curve and chaos
- A new matrix form to generate all \(3\times 3\) involutory MDS matrices over \(\mathbb{F}_{2^m}\)
- Fully automated differential-linear attacks against ARX ciphers
- Construction of balanced vectorial Boolean functions with almost optimal nonlinearity and very low differential-linear uniformity
- Improved differential-linear attacks with applications to ARX ciphers
- Improved differential-linear attacks with applications to ARX ciphers
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4934705)