On the Diffusion Property of Iterated Functions
暂无分享,去创建一个
[1] H. Feistel. Cryptography and Computer Privacy , 1973 .
[2] Willi Meier,et al. Algebraic Immunity of S-Boxes and Augmented Functions , 2007, FSE.
[3] Claude Carlet,et al. Vectorial Boolean Functions for Cryptography , 2006 .
[4] John B. Kam,et al. Structured Design of Substitution-Permutation Encryption Networks , 1979, IEEE Transactions on Computers.
[5] K. Conrad,et al. Finite Fields , 2018, Series and Products in the Development of Mathematics.
[6] Josef Pieprzyk,et al. Rotation-Symmetric Functions and Fast Hashing , 1998, J. Univers. Comput. Sci..
[7] R. Forre,et al. Methods and instruments for designing S-boxes , 1990, Journal of Cryptology.
[8] Gregory V. Bard,et al. Algebraic Cryptanalysis , 2009 .
[9] Josef Pieprzyk,et al. Fast Hashing and Rotation-Symmetric Functions , 1999 .
[10] Alexander Maximov,et al. Classes of Plateaued Rotation Symmetric Boolean Functions under Transformation of Walsh Spectra , 2004, IACR Cryptol. ePrint Arch..
[11] Josef Pieprzyk,et al. Cryptanalysis of Block Ciphers with Overdefined Systems of Equations , 2002, ASIACRYPT.
[12] Joan Daemen,et al. Cipher and hash function design strategies based on linear and differential cryptanalysis , 1995 .
[13] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[14] Rudolf Lide,et al. Finite fields , 1983 .
[15] Pulak Mishra,et al. Mergers, Acquisitions and Export Competitive- ness: Experience of Indian Manufacturing Sector , 2012 .
[16] Claude Carlet,et al. Boolean Functions for Cryptography and Error-Correcting Codes , 2010, Boolean Models and Methods.
[17] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[18] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[19] Vincent Rijmen,et al. Comments by the NESSIE Project on the AES Finalists , 2000 .