MISTY
From MaRDI portal
Software:35923
No author found.
Related Items (29)
Security evaluation of MISTY structure with SPN round function ⋮ The number of almost perfect nonlinear functions grows exponentially ⋮ Integral cryptanalysis on full MISTY1 ⋮ Constructing infinite families of low differential uniformity (\(n,m\))-functions with \(m>n/2\) ⋮ What is the effective key length for a block cipher: an attack on every practical block cipher ⋮ A new construction of differentially 4-uniform \((n,n-1)\)-functions ⋮ A quantum distinguisher for 7/8-round SMS4 block cipher ⋮ Applications of Simon's algorithm in quantum attacks on Feistel variants ⋮ On Lai-Massey and quasi-Feistel ciphers ⋮ Boomerang uniformity of popular S-box constructions ⋮ Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions ⋮ Non-cryptographic primitive for pseudorandom permutation. ⋮ A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony ⋮ Practical-time attacks against reduced variants of~MISTY1 ⋮ CS-Cipher ⋮ Aperiodic propagation criteria for Boolean functions ⋮ An Improved Impossible Differential Attack on MISTY1 ⋮ Revisiting key schedule's diffusion in relation with round function's diffusion ⋮ Perfect nonlinear functions and cryptography ⋮ Constructions of complete permutation polynomials ⋮ Construction of Lightweight S-Boxes Using Feistel and MISTY Structures ⋮ $\mathsf{XS}$-circuits in block ciphers ⋮ New classes of $8$-bit permutations based on a butterfly structure ⋮ Построение подстановок пространства $V_{2m}$ с использованием $(2m,m)$-функций ⋮ Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice ⋮ Fast software encryption. 4th international workshop, FSE '97, Haifa, Israel, January 20--22, 1997. Proceedings ⋮ New criteria for linear maps in AES-like ciphers ⋮ On Related-Key Attacks and KASUMI: The Case of A5/3 ⋮ A $$2^{70}$$ Attack on the Full MISTY1
This page was built for software: MISTY