MISTY

From MaRDI portal
Software:35923



swMATH24162MaRDI QIDQ35923


No author found.





Related Items (29)

Security evaluation of MISTY structure with SPN round functionThe number of almost perfect nonlinear functions grows exponentiallyIntegral cryptanalysis on full MISTY1Constructing infinite families of low differential uniformity (\(n,m\))-functions with \(m>n/2\)What is the effective key length for a block cipher: an attack on every practical block cipherA new construction of differentially 4-uniform \((n,n-1)\)-functionsA quantum distinguisher for 7/8-round SMS4 block cipherApplications of Simon's algorithm in quantum attacks on Feistel variantsOn Lai-Massey and quasi-Feistel ciphersBoomerang uniformity of popular S-box constructionsMind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitionsNon-cryptographic primitive for pseudorandom permutation.A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephonyPractical-time attacks against reduced variants of~MISTY1CS-CipherAperiodic propagation criteria for Boolean functionsAn Improved Impossible Differential Attack on MISTY1Revisiting key schedule's diffusion in relation with round function's diffusionPerfect nonlinear functions and cryptographyConstructions of complete permutation polynomialsConstruction of Lightweight S-Boxes Using Feistel and MISTY Structures$\mathsf{XS}$-circuits in block ciphersNew classes of $8$-bit permutations based on a butterfly structureПостроение подстановок пространства $V_{2m}$ с использованием $(2m,m)$-функцийCorrelation Power Analysis of Lightweight Block Ciphers: From Theory to PracticeFast software encryption. 4th international workshop, FSE '97, Haifa, Israel, January 20--22, 1997. ProceedingsNew criteria for linear maps in AES-like ciphersOn Related-Key Attacks and KASUMI: The Case of A5/3A $$2^{70}$$ Attack on the Full MISTY1


This page was built for software: MISTY