scientific article; zbMATH DE number 1406761
From MaRDI portal
Publication:4940674
zbMath0939.94551MaRDI QIDQ4940674
Publication date: 1 March 2000
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items
Another look at normal approximations in cryptanalysis ⋮ Affine linear cryptanalysis ⋮ Improving algorithm 2 in multidimensional (zero-correlation) linear cryptanalysis using \(\chi^2\)-method ⋮ Evolutionary cryptography against multidimensional linear cryptanalysis ⋮ Rigorous upper bounds on data complexities of block cipher cryptanalysis ⋮ How Much Can Complexity of Linear Cryptanalysis Be Reduced? ⋮ Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECK ⋮ On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2 ⋮ On the computational power of the light: a plan for breaking data encryption standard ⋮ Another look at key randomisation hypotheses ⋮ Key structures: improved related-key boomerang attack against the full AES-256 ⋮ Generic framework for key-guessing improvements ⋮ Improved truncated differential distinguishers of AES with concrete S-box ⋮ Optimising linear key recovery attacks with affine Walsh transform pruning ⋮ Linear cryptanalysis of reduced-round SPECK ⋮ Quantum linear key-recovery attacks using the QFT ⋮ Accurate estimates of the data complexity and success probability for various cryptanalyses ⋮ Multidimensional linear cryptanalysis ⋮ Lombardi Drawings of Knots and Links ⋮ Partitioning cryptanalysis ⋮ Improving linear cryptanalysis of LOKI91 by probabilistic counting method ⋮ A family of trapdoor ciphers ⋮ CS-Cipher ⋮ On the Design and Security of RC2 ⋮ Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques ⋮ A methodology for differential-linear cryptanalysis and its applications ⋮ Generic attacks with standard deviation analysis on a-Feistel schemes ⋮ Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses ⋮ Generation algorithm of a sort of P-permutations ⋮ On probability of success in linear and differential cryptanalysis ⋮ Upper bounds for the average probabilities of difference characteristics of block ciphers with alternation of Markov transformations and generalized Markov transformations ⋮ Slidex attacks on the Even-Mansour encryption scheme ⋮ Unnamed Item ⋮ Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes ⋮ Connections between quaternary and Boolean bent functions ⋮ Troika: a ternary cryptographic hash function ⋮ Linear Cryptanalysis of Non Binary Ciphers ⋮ Provable security of block ciphers against linear cryptanalysis: a mission impossible? ⋮ Многомерный линейный метод и показатели рассеивания линейной среды шифрпреобразований ⋮ Linear and differential cryptanalysis: Another viewpoint ⋮ Improving key-recovery in linear attacks: application to 28-round PRESENT ⋮ The Cryptanalysis of Reduced-Round SMS4 ⋮ An overview of distinguishing attacks on stream ciphers ⋮ Multiple encryption with minimum key ⋮ Linear Cryptanalysis of PRINTcipher – Trails and Samples Everywhere ⋮ Unnamed Item ⋮ Unnamed Item ⋮ Unnamed Item ⋮ Determining whether a given cryptographic function is a permutation of another given cryptographic function -- a problem in intellectual property ⋮ Large-scale high-resolution computational validation of novel complexity models in linear cryptanalysis