scientific article; zbMATH DE number 1406761

From MaRDI portal
Publication:4940674

zbMath0939.94551MaRDI QIDQ4940674

Mitsuru Matsui

Publication date: 1 March 2000


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Another look at normal approximations in cryptanalysisAffine linear cryptanalysisImproving algorithm 2 in multidimensional (zero-correlation) linear cryptanalysis using \(\chi^2\)-methodEvolutionary cryptography against multidimensional linear cryptanalysisRigorous upper bounds on data complexities of block cipher cryptanalysisHow Much Can Complexity of Linear Cryptanalysis Be Reduced?Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECKOn the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2On the computational power of the light: a plan for breaking data encryption standardAnother look at key randomisation hypothesesKey structures: improved related-key boomerang attack against the full AES-256Generic framework for key-guessing improvementsImproved truncated differential distinguishers of AES with concrete S-boxOptimising linear key recovery attacks with affine Walsh transform pruningLinear cryptanalysis of reduced-round SPECKQuantum linear key-recovery attacks using the QFTAccurate estimates of the data complexity and success probability for various cryptanalysesMultidimensional linear cryptanalysisLombardi Drawings of Knots and LinksPartitioning cryptanalysisImproving linear cryptanalysis of LOKI91 by probabilistic counting methodA family of trapdoor ciphersCS-CipherOn the Design and Security of RC2Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing TechniquesA methodology for differential-linear cryptanalysis and its applicationsGeneric attacks with standard deviation analysis on a-Feistel schemesSuccess probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypothesesGeneration algorithm of a sort of P-permutationsOn probability of success in linear and differential cryptanalysisUpper bounds for the average probabilities of difference characteristics of block ciphers with alternation of Markov transformations and generalized Markov transformationsSlidex attacks on the Even-Mansour encryption schemeUnnamed ItemNon-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-BoxesConnections between quaternary and Boolean bent functionsTroika: a ternary cryptographic hash functionLinear Cryptanalysis of Non Binary CiphersProvable security of block ciphers against linear cryptanalysis: a mission impossible?Многомерный линейный метод и показатели рассеивания линейной среды шифрпреобразованийLinear and differential cryptanalysis: Another viewpointImproving key-recovery in linear attacks: application to 28-round PRESENTThe Cryptanalysis of Reduced-Round SMS4An overview of distinguishing attacks on stream ciphersMultiple encryption with minimum keyLinear Cryptanalysis of PRINTcipher – Trails and Samples EverywhereUnnamed ItemUnnamed ItemUnnamed ItemDetermining whether a given cryptographic function is a permutation of another given cryptographic function -- a problem in intellectual propertyLarge-scale high-resolution computational validation of novel complexity models in linear cryptanalysis