Decomposition of permutations in a finite field
暂无分享,去创建一个
[1] Amir Moradi,et al. Side-Channel Resistant Crypto for Less than 2,300 GE , 2011, Journal of Cryptology.
[2] Srinivas Vivek,et al. Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel Countermeasures , 2014, CHES.
[3] Cunsheng Ding,et al. On Almost Perfect Nonlinear Permutations , 1994, EUROCRYPT.
[4] L. Carlitz,et al. A note on permutation functions over a finite field , 1962 .
[5] Vincent Rijmen,et al. Threshold Implementations of all 3x3 and 4x4 S-boxes , 2012, IACR Cryptol. ePrint Arch..
[6] Wilfried Meidl,et al. On the Carlitz rank of permutation polynomials , 2009, Finite Fields Their Appl..
[7] Michael E. Zieve. On a theorem of Carlitz , 2008, 0810.2834.
[8] L. Carlitz. A note on permutations in an arbitrary field , 1963 .
[9] L. Carlitz. Permutations in a finite field , 1953 .
[10] Amir Moradi. Advances in side-channel security , 2016 .
[11] Claude Carlet,et al. Vectorial Boolean Functions for Cryptography , 2006 .
[12] Jacques Patarin,et al. Generic Attacks on Feistel Schemes , 2001, ASIACRYPT.
[13] Phuong Ha Nguyen,et al. Enabling 3-share Threshold Implementations for any 4-bit S-box , 2012, IACR Cryptol. ePrint Arch..
[14] Vincent Rijmen,et al. Threshold implementations of small S-boxes , 2014, Cryptography and Communications.
[15] Kaisa Nyberg,et al. Differentially Uniform Mappings for Cryptography , 1994, EUROCRYPT.
[16] Srinivas Vivek,et al. Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012 , 2013, CHES.
[17] Claude Carlet,et al. Algebraic Decomposition for Probing Security , 2015, CRYPTO.
[18] Claude Carlet,et al. Higher-Order Masking Schemes for S-Boxes , 2012, FSE.
[19] Gregor Leander,et al. On the classification of APN functions up to dimension five , 2008, Des. Codes Cryptogr..