The block symmetric ciphers in the post-quantum period
暂无分享,去创建一个
[1] I. D. Gorbenko,et al. ENSEMBLE AND CORRELATION PROPERTIES OF CRYPTOGRAPHIC SIGNALS FOR TELECOMMUNICATION SYSTEM AND NETWORK APPLICATIONS , 2016 .
[2] Roman Oliynykov,et al. Improvement for distinguisher efficiency of the 3-round Feistel network and a random permutation , 2011, Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems.
[3] V. M. Grachev,et al. Data security mechanisms implemented in the database with universal model , 2014 .
[4] Lov K. Grover. A fast quantum mechanical algorithm for database search , 1996, STOC '96.
[5] Roman Oliynykov,et al. A Method for Security Estimation of the Spn-Based Block Cipher Against Related-Key Attacks , 2014 .
[6] I. Gorbenko,et al. Methods of Information Protection in Communications Systems and Methods of Their Cryptoanalysis , 1998 .
[7] Y. Stasev,et al. Formation of pseudorandom sequences with improved autocorrelation properties , 2007 .
[8] Alexandr Kuznetsov,et al. The Design of Boolean Functions by Modified Hill Climbing Method , 2009, 2009 Sixth International Conference on Information Technology: New Generations.
[9] Properties of Linear Transformations for Symmetric Block Ciphers on the Basis of MDS-Codes , 2011, 2011 Conference on Network and Information Systems Security.
[10] Roman Oliynykov,et al. Influence of addition modulo 2n on algebraic attacks , 2016, Cryptography and Communications.
[11] Y. Stasev,et al. Asymmetric Code-Theoretical Schemes Constructed with the Use of Algebraic Geometric Codes , 2005 .
[12] V. M. Grachev,et al. Technology for developing databases of information systems , 2014 .
[13] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..