The following pages link to MISTY (Q35923):
Displaying 28 items.
- A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony (Q484333) (← links)
- Practical-time attacks against reduced variants of~MISTY1 (Q494594) (← links)
- On Lai-Massey and quasi-Feistel ciphers (Q629883) (← links)
- What is the effective key length for a block cipher: an attack on every practical block cipher (Q893734) (← links)
- A new construction of differentially 4-uniform \((n,n-1)\)-functions (Q895007) (← links)
- New criteria for linear maps in AES-like ciphers (Q1032487) (← links)
- Fast software encryption. 4th international workshop, FSE '97, Haifa, Israel, January 20--22, 1997. Proceedings (Q1271323) (← links)
- Non-cryptographic primitive for pseudorandom permutation. (Q1426446) (← links)
- Constructions of complete permutation polynomials (Q1801102) (← links)
- Boomerang uniformity of popular S-box constructions (Q2200524) (← links)
- Integral cryptanalysis on full MISTY1 (Q2408592) (← links)
- Constructing infinite families of low differential uniformity (\(n,m\))-functions with \(m>n/2\) (Q2420471) (← links)
- Aperiodic propagation criteria for Boolean functions (Q2495652) (← links)
- Revisiting key schedule's diffusion in relation with round function's diffusion (Q2510656) (← links)
- Perfect nonlinear functions and cryptography (Q2512886) (← links)
- Security evaluation of MISTY structure with SPN round function (Q2629406) (← links)
- The number of almost perfect nonlinear functions grows exponentially (Q2661694) (← links)
- A quantum distinguisher for 7/8-round SMS4 block cipher (Q2684290) (← links)
- Applications of Simon's algorithm in quantum attacks on Feistel variants (Q2687219) (← links)
- Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions (Q2692350) (← links)
- Construction of Lightweight S-Boxes Using Feistel and MISTY Structures (Q2807223) (← links)
- Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice (Q2822694) (← links)
- A $$2^{70}$$ Attack on the Full MISTY1 (Q2835596) (← links)
- On Related-Key Attacks and KASUMI: The Case of A5/3 (Q3104731) (← links)
- $\mathsf{XS}$-circuits in block ciphers (Q3383057) (← links)
- New classes of $8$-bit permutations based on a butterfly structure (Q3383078) (← links)
- Построение подстановок пространства $V_{2m}$ с использованием $(2m,m)$-функций (Q3383126) (← links)
- An Improved Impossible Differential Attack on MISTY1 (Q3600390) (← links)