Advances in Cryptology – CRYPTO 2004
From MaRDI portal
Publication:5311541
DOI10.1007/B99099zbMATH Open1104.94308OpenAlexW2477011922MaRDI QIDQ5311541FDOQ5311541
Publication date: 23 August 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b99099
DESlinear cryptanalysisBlock ciphersmultivariate quadratic equationsS-box designFeistel schemescorrelation attacks on block ciphersgeneralised linear cryptanalysisI/O sumsinverse-based S-box
Cited In (12)
- Can a differential attack work for an arbitrarily large number of rounds?
- Determining whether a given cryptographic function is a permutation of another given cryptographic function -- a problem in intellectual property
- Non-asymptotic lower bounds for the data complexity of statistical attacks on symmetric cryptosystems
- SEA: A Scalable Encryption Algorithm for Small Embedded Applications
- Biholomorphic Cryptosystems
- Upper estimates of imbalance of bilinear approximations for round functions of block ciphers
- Cryptanalysis of the Double-Feedback XOR-Chain Scheme Proposed in Indocrypt 2013
- Title not available (Why is that?)
- On the Diffusion of Generalized Feistel Structures Regarding Differential and Linear Cryptanalysis
- Coding and Cryptography
- On degree-\(d\) zero-sum sets of full rank
- On weak rotors, Latin squares, linear algebraic representations, invariant differentials and cryptanalysis of Enigma
This page was built for publication: Advances in Cryptology – CRYPTO 2004
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5311541)