SAFER
From MaRDI portal
Software:33787
swMATH21990MaRDI QIDQ33787FDOQ33787
Author name not available (Why is that?)
Cited In (28)
- A fast new DES implementation in software
- Improved (related-key) differential cryptanalysis on GIFT
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- SAFER K-64: A byte-oriented block-ciphering algorithm
- A note on APN permutations in even dimension
- Practical Attack on the Full MMB Block Cipher
- Flaws of hypercube-like ciphers
- Обобщенные квази-адамаровы преобразования на конечных группах
- On the boomerang uniformity of some permutation polynomials
- Title not available (Why is that?)
- An upper bound for the linearity of exponential Welch-Costas functions
- On the boomerang uniformity of quadratic permutations
- Autocorrelations of vectorial Boolean functions
- Permutation polynomials and their differential properties over residue class rings
- APN permutations on \(\mathbb Z_n\) and Costas arrays
- TWOPRIME: A fast stream ciphering algorithm
- XMX: A firmware-oriented block cipher based on modular multiplications
- CS-Cipher
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
- Title not available (Why is that?)
- Advances in Cryptology - CRYPTO 2003
- The second-order zero differential spectra of almost perfect nonlinear functions and the inverse function in odd characteristic
- A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony
- Efficient Chaotic Encryption Scheme with OFB Mode
- Structural cryptanalysis of SASAS
- Rotation symmetry in algebraically generated cryptographic substitution tables
- Differential \(\delta \)-uniformity and non-linearity of permutations over \(\mathbb{Z}_n\)
- Perfect nonlinear functions and cryptography
This page was built for software: SAFER