Publication:4940677

From MaRDI portal


zbMath0939.94534MaRDI QIDQ4940677

Burton S. jun. Kaliski, Matthew J. B. Robshaw

Publication date: 1 March 2000



94A60: Cryptography


Related Items

Partitioning cryptanalysis, Unnamed Item, Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECK, Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes, Linear Cryptanalysis of Non Binary Ciphers, 3D: A Three-Dimensional Block Cipher, Критерии проверки гипотезы о наличии зашумленной функциональной зависимости между случайными двоичными векторами и битами, Another look at key randomisation hypotheses, A geometric approach to linear cryptanalysis, Improved truncated differential distinguishers of AES with concrete S-box, Quantum linear key-recovery attacks using the QFT, Another look at normal approximations in cryptanalysis, Improving algorithm 2 in multidimensional (zero-correlation) linear cryptanalysis using \(\chi^2\)-method, Evolutionary cryptography against multidimensional linear cryptanalysis, Zero-correlation linear cryptanalysis of reduced-round LBlock, Multidimensional linear distinguishing attacks and Boolean functions, On quadratic approximations in block ciphers, Multiple (truncated) differential cryptanalysis: explicit upper bounds on data complexity, Rigorous upper bounds on data complexities of block cipher cryptanalysis, Multidimensional linear cryptanalysis, Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses, Computing expected differential probability of (truncated) differentials and expected linear potential of (multidimensional) linear hulls in SPN block ciphers, On probability of success in linear and differential cryptanalysis, Cryptographic Analysis of All 4 × 4-Bit S-Boxes, How Much Can Complexity of Linear Cryptanalysis Be Reduced?, Differential-Multiple Linear Cryptanalysis, Linear Cryptanalysis of PRINTcipher – Trails and Samples Everywhere, On Linear Hulls and Trails, SEA: A Scalable Encryption Algorithm for Small Embedded Applications, Linear Distinguishing Attack on Shannon, Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent, Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent, On the Higher Order Nonlinearities of Boolean Functions and S-Boxes, and Their Generalizations, A Statistical Saturation Attack against the Block Cipher PRESENT, The Cryptanalysis of Reduced-Round SMS4