The following pages link to (Q4036895):
Displaying 40 items.
- Secret sets and applications (Q293178) (← links)
- Arbitrated unconditionally secure authentication scheme with multi-senders (Q293236) (← links)
- An upper bound for the linearity of exponential Welch-Costas functions (Q439098) (← links)
- Generic attacks on the Lai-Massey scheme (Q522214) (← links)
- On Lai-Massey and quasi-Feistel ciphers (Q629883) (← links)
- Statistical integral attack on CAST-256 and IDEA (Q680942) (← links)
- Authenticated key agreement in dynamic peer groups (Q703558) (← links)
- On some block ciphers and imprimitive groups (Q843945) (← links)
- G-perfect nonlinear functions (Q1008966) (← links)
- Fourier transforms and bent functions on finite groups (Q1650816) (← links)
- Integral attacks on round-reduced Bel-T-256 (Q1726664) (← links)
- Differential cryptanalysis of Lucifer (Q1912769) (← links)
- Pseudorandomness analysis of the (extended) Lai-Massey scheme (Q1944043) (← links)
- Minimizing the two-round Even-Mansour cipher (Q1994640) (← links)
- Group polynomials over rings (Q1996831) (← links)
- On invariant subspaces in the Lai-Massey scheme and a primitivity reduction (Q2050141) (← links)
- A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis (Q2161424) (← links)
- Higher order differentiation over finite fields with applications to generalising the cube attack (Q2407059) (← links)
- Nonlinear functions and difference sets on group actions (Q2407715) (← links)
- Type-preserving matrices and security of block ciphers (Q2415388) (← links)
- On the group generated by the round functions of translation based ciphers over arbitrary finite fields (Q2434409) (← links)
- Parameterized hash functions (Q2443014) (← links)
- Perfect nonlinear functions and cryptography (Q2512886) (← links)
- A bit-vector differential model for the modular addition by a constant (Q2692348) (← links)
- Practical Attack on the Full MMB Block Cipher (Q2889870) (← links)
- Cryptanalysis of WIDEA (Q2946870) (← links)
- $\mathsf{XS}$-circuits in block ciphers (Q3383057) (← links)
- An analysis of international data encryption algorithm(IDEA) security against differential cryptanalysis (Q3403215) (← links)
- JEROBOAM (Q4639440) (← links)
- Constructing $8$-bit permutations, $8$-bit involutions and $8$-bit orthomorphisms with almost optimal cryptographic parameters (Q5071475) (← links)
- Deniability of Symmetric Encryption Based on Computational Indistinguishability from Probabilistic Ciphering (Q5117282) (← links)
- (Q5150537) (← links)
- Multiscale transform-based secured joint efficient medical image compression-encryption using symmetric key cryptography and ebcot encoding technique (Q5236782) (← links)
- Linear Cryptanalysis of Non Binary Ciphers (Q5452257) (← links)
- Side channel cryptanalysis of product ciphers (Q5862295) (← links)
- Feedback linearly extended discrete functions (Q5879291) (← links)
- Logistic map as a block encryption algorithm (Q5948266) (← links)
- A further study on bridge structures and constructing bijective S-boxes for low-latency masking (Q6063138) (← links)
- An innovative approach towards image encryption by using novel PRNs and S-boxes modeling techniques (Q6104691) (← links)
- Differential experiments using parallel alternative operations (Q6193394) (← links)