Differential cryptanalysis of DES-like cryptosystems
From MaRDI portal
(Redirected from Publication:807011)
Recommendations
Cites work
- scientific article; zbMATH DE number 3952651 (Why is no real title available?)
- scientific article; zbMATH DE number 54248 (Why is no real title available?)
- scientific article; zbMATH DE number 3793924 (Why is no real title available?)
- A cryptanalytic time-memory trade-off
- A fast software one-way hash function
- Dependence of output on input in DES: small avalanche characteristics
- Fast Data Encipherment Algorithm FEAL
Cited in
(only showing first 100 items - show all)- Image encryption using \(q\)-deformed logistic map
- On equivalence between known families of quadratic APN functions
- On quadratic approximations in block ciphers
- Impossible differential attacks on 13-round CLEFIA-128
- Results on rotation-symmetric S-boxes
- Accurate estimates of the data complexity and success probability for various cryptanalyses
- More constructions of differentially 4-uniform permutations on \(\mathbb {F}_{2^{2k}}\)
- Linear Cryptanalysis of Non Binary Ciphers
- Binomial differentially 4 uniform permutations with high nonlinearity
- Relating three nonlinearity parameters of vectorial functions and building APN functions from bent functions
- Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions
- Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties
- Highly nonlinear mappings
- Constructing new APN functions from known ones
- A novel heuristic method for obtaining \(S\)-boxes
- Probability distributions of correlation and differentials in block ciphers
- scientific article; zbMATH DE number 417582 (Why is no real title available?)
- G-perfect nonlinear functions
- On the relationships between perfect nonlinear functions and universal hash families
- An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps
- scientific article; zbMATH DE number 708833 (Why is no real title available?)
- scientific article; zbMATH DE number 708826 (Why is no real title available?)
- On the Walsh spectrum of a family of quadratic APN functions with five terms
- New secondary constructions of differentially 4-uniform permutations over \(\mathbb F_{2^{2k}}\)
- Nonlinearities of S-boxes
- Permutation polynomials EA-equivalent to the inverse function over \(\mathrm{GF}(2^n)\)
- New Perfect Nonlinear Multinomials over F $_{p^{2k}}$ for Any Odd Prime p
- Cryptanalysis on a parallel keyed hash function based on chaotic maps
- New explicit constructions of differentially 4-uniform permutations via special partitions of \(\mathbb{F}_{2^{2 k}}\)
- Algebraic nonlinearity and its applications to cryptography
- A method for designing dynamical S-boxes based on discretized chaotic map
- A novel method for designing S-boxes based on chaotic maps
- On some block ciphers and imprimitive groups
- On the differential uniformities of functions over finite fields
- Permutation polynomials with low differential uniformity over finite fields of odd characteristic
- scientific article; zbMATH DE number 1406763 (Why is no real title available?)
- NON-BOOLEAN ALMOST PERFECT NONLINEAR FUNCTIONS ON NON-ABELIAN GROUPS
- More differentially 6-uniform power functions
- Towards the optimality of Feistel ciphers with substitution-permutation functions
- Known-Key Distinguishers for Some Block Ciphers
- On isotopisms of commutative presemifields and CCZ-equivalence of functions
- A new spatiotemporally chaotic cryptosystem and its security and performance analyses
- On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2
- Rapid solution of problems by quantum computation
- On cross-correlation indicators of an S-box
- A construction of novel chaos base nonlinear component of block cipher
- On group rings and some of their applications to combinatorics and symmetric cryptography
- Practical security against linear cryptanalysis for SMS4-like ciphers with SP round function
- A method for designing strong S-Boxes based on chaotic Lorenz system
- On the differential and linear efficiency of balanced Feistel networks
- Related-key attack on full-round PICARO
- New types of cryptanalytic attacks using related keys
- A block cipher with dynamic S-boxes based on tent map
- Constructing new differentially 4-uniform permutations from known ones
- Algebraic Cryptanalysis of the Data Encryption Standard
- scientific article; zbMATH DE number 1394292 (Why is no real title available?)
- Analysis of \(3\)-line generalized Feistel networks with double SD-functions
- On-line/off-line digital signatures
- MATRIX REPRESENTATIONS OF BOOLEAN FUNCTIONS AND THEIR APPLICATION
- A new large class of functions not APN infinitely often
- Improbable differential attacks on \texttt{PRESENT} using undisturbed bits
- Characterization of almost perfect nonlinear functions in terms of subfunctions
- Higher Order Derivatives and Differential Cryptanalysis
- Distinguishing distributions using Chernoff information
- Multiple differential cryptanalysis: theory and practice
- Provable security against a differential attack
- An Expanded Set of S-box Design Criteria Based on Information Theory and its Relation to Differential-Like Attacks
- On EA-equivalence of certain permutations to power mappings
- On unbalanced feistel networks with contracting MDS diffusion
- More constructions of APN and differentially 4-uniform functions by concatenation
- Designing S-boxes based on 3-D four-wing autonomous chaotic system
- Improved top-down techniques in differential cryptanalysis
- Higher order differentiation over finite fields with applications to generalising the cube attack
- New commutative semifields defined by new PN multinomials
- A novel method of S-box design based on chaotic map and composition method
- Constructing differentially 4-uniform permutations over \(\mathrm{GF}(2^{2m})\) from quadratic APN permutations over \(\mathrm{GF}(2^{2m+1})\)
- A homophonic DES
- Another look at normal approximations in cryptanalysis
- Provable security for 13 round Skipjack-like structure
- A new characterization of semi-bent and bent functions on finite fields
- Differentially 4-uniform bijections by permuting the inverse function
- A cryptanalytic time-memory trade-off
- A new family of differentially 4-uniform permutations over \(\mathbb{F}_{2^{2k}}\) for odd \(k\)
- On relations between CCZ- and EA-equivalences
- The replacement of irreducible polynomial and affine mapping for the construction of a strong S-box
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
- scientific article; zbMATH DE number 7310182 (Why is no real title available?)
- New links between nonlinearity and differential uniformity
- On CCZ-equivalence, extended-affine equivalence, and function twisting
- New criteria for linear maps in AES-like ciphers
- scientific article; zbMATH DE number 7746257 (Why is no real title available?)
- Fast hashing and stream encryption with \textsc{Panama}
- On the symmetric properties of APN functions
- CCZ-equivalence of bent vectorial functions and related constructions
- Improving the strict avalanche characteristics of cryptographic functions
- P℘N functions, complete mappings and quasigroup difference sets
- Analysis of NORX: investigating differential and rotational properties
- Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE
- Cryptanalysis of a new image alternate encryption algorithm based on chaotic map
- On the properties of vectorial functions with plateaued components and their consequences on APN functions
This page was built for publication: Differential cryptanalysis of DES-like cryptosystems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q807011)