Differential cryptanalysis of DES-like cryptosystems
From MaRDI portal
(Redirected from Publication:807011)
Recommendations
Cites work
- scientific article; zbMATH DE number 3952651 (Why is no real title available?)
- scientific article; zbMATH DE number 54248 (Why is no real title available?)
- scientific article; zbMATH DE number 3793924 (Why is no real title available?)
- A cryptanalytic time-memory trade-off
- A fast software one-way hash function
- Dependence of output on input in DES: small avalanche characteristics
- Fast Data Encipherment Algorithm FEAL
Cited in
(only showing first 100 items - show all)- On the relationships between perfect nonlinear functions and universal hash families
- More constructions of APN and differentially 4-uniform functions by concatenation
- Investigation of some cryptographic properties of the \(8 \times 8\) S-boxes created by quasigroups
- A framework to optimize implementations of matrices
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
- 3D: A Three-Dimensional Block Cipher
- Automatic tool for searching for differential characteristics in ARX ciphers and applications
- Subgroups of direct products of groups invariant under the action of permutations on factors
- On the \(c\)-differential spectrum of power functions over finite fields
- Generalization of one method of a filter generator key recovery
- Generic attacks with standard deviation analysis on a-Feistel schemes
- scientific article; zbMATH DE number 708833 (Why is no real title available?)
- Generalized boomerang connectivity table and improved cryptanalysis of GIFT
- Efficient chaotic encryption scheme with OFB mode
- Distinguishing attacks on block ciphers by differentials of two-block texts
- On second-order derivatives of Boolean functions and cubic APN permutations in even dimension
- Doubly perfect nonlinear Boolean permutations
- Differential Cryptanalysis of the ICE Encryption Algorithm
- More differentially 6-uniform power functions
- Towards the optimality of Feistel ciphers with substitution-permutation functions
- Permutation code encryption—New achievement based on path encryption
- A new family of differentially 4-uniform permutations over \(\mathbb{F}_{2^{2k}}\) for odd \(k\)
- On the differential and linear efficiency of balanced Feistel networks
- CCZ-equivalence of bent vectorial functions and related constructions
- Wave-shaped round functions and primitive groups
- Differential attacks: using alternative operations
- A new large class of functions not APN infinitely often
- The rebound attack and subspace distinguishers: application to Whirlpool
- Some functions with low differential uniformity
- A differential cryptanalysis of tree-structured substitution-permutation networks
- On a conjecture on APN permutations
- The block cipher \textsc{Square}
- Involutory differentially 4-uniform permutations from known constructions
- Can a differential attack work for an arbitrarily large number of rounds?
- A note on some algebraic trapdoors for block ciphers
- Higher Order Derivatives and Differential Cryptanalysis
- A novel heuristic method for obtaining \(S\)-boxes
- An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps
- Classification of quadratic APN functions with coefficients in \(\mathbb{F}_2\) for dimensions up to 9
- New generalized almost perfect nonlinear functions
- Security analysis of SIMECK block cipher against related-key impossible differential
- Analysis of NORX: investigating differential and rotational properties
- Boomerang uniformity of some classes of functions over finite fields
- Cryptanalysis of the AEAD and hash algorithm DryGASCON
- Automatic differential analysis of ARX block ciphers with application to SPECK and LEA
- A construction of novel chaos base nonlinear component of block cipher
- Analysis of simplified DES algorithms
- Binomial differentially 4 uniform permutations with high nonlinearity
- On design and analysis of a new block cipher
- On the EA-classes of known APN functions in small dimensions
- On differential uniformity of maps that may hide an algebraic trapdoor
- A tutorial on linear and differential cryptanalysis
- Toward the True Random Cipher: On Expected Linear Probability Values for SPNS with Randomly Selected S-Boxes
- Permutation polynomials EA-equivalent to the inverse function over \(\mathrm{GF}(2^n)\)
- On some connections between statistics and cryptology
- New links between nonlinearity and differential uniformity
- On CCZ-equivalence, extended-affine equivalence, and function twisting
- Experimental evaluation of book drawing algorithms
- The method of S-box construction
- Higher Order Differential Attack of a CAST Cipher
- Efficient cache attacks on AES, and countermeasures
- FUTURE: a lightweight block cipher using an optimal diffusion matrix
- Linear and differential cryptanalysis: another viewpoint
- Nilpotent linearized polynomials over finite fields, revisited
- Notions and relations for RKA-secure permutation and function families
- Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions
- Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties
- Non-asymptotic lower bounds for the data complexity of statistical attacks on symmetric cryptosystems
- Higher order differentiation over finite fields with applications to generalising the cube attack
- On relationship between the parameters characterizing nonlinearity and nonhomomorphy of vector spaces transformation
- Cryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato}
- Layout graphs, random walks and the \(t\)-wise independence of SPN block ciphers
- Practical-time related-key attack on GOST with secret S-boxes
- scientific article; zbMATH DE number 1394292 (Why is no real title available?)
- Connections among nonlinearity, avalanche and correlation immunity
- Impossible differential attacks on 13-round CLEFIA-128
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- Some results concerning cryptographically significant mappings over \(\text{GF}(2^{n})\)
- Related-Key Differential-Linear Attacks on Reduced AES-192
- Weak subtweakeys in SKINNY
- New commutative semifields defined by new PN multinomials
- New Lightweight DES Variants
- A compress slide attack on the full GOST block cipher
- Differential attack on nine rounds of the SEED block cipher
- On full differential uniformity of permutations on the ring of integers modulo \(n\)
- Fast and secure chaos-based cryptosystem for images
- Indices to measure the cryptographic strength of S-box
- Evaluation and cryptanalysis of the Pandaka lightweight cipher
- Integral characteristics by keyspace partitioning
- Full round distinguishing and key-recovery attacks on SAND-2
- Differentially low uniform permutations from known 4-uniform functions
- scientific article; zbMATH DE number 2216934 (Why is no real title available?)
- Vectorial Boolean functions with very low differential-linear uniformity using Maiorana-McFarland type construction
- The design of composite permutations with applications to DES-like S-boxes
- New explicit constructions of differentially 4-uniform permutations via special partitions of \(\mathbb{F}_{2^{2 k}}\)
- Nonlinearities of S-boxes
- Affine equivalence in the AES round function
- Generalized isotopic shift construction for APN functions
- Side channel cryptanalysis of product ciphers
- Non-monomial permutations with differential uniformity six
This page was built for publication: Differential cryptanalysis of DES-like cryptosystems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q807011)