Distinguishing Properties of Higher Order Derivatives of Boolean Functions
暂无分享,去创建一个
Bo Zhu | Xiaorui Sun | Xuejia Lai | Ming Duan | Mohan Yang | Xiaorui Sun | Mohan Yang | Xuejia Lai | Ming Duan | Bo Zhu
[1] Michael Vielhaber. Breaking ONE.FIVIUM by AIDA an Algebraic IV Differential Attack , 2007, IACR Cryptol. ePrint Arch..
[2] Anne Canteaut,et al. Symmetric Boolean functions , 2005, IEEE Transactions on Information Theory.
[3] Adi Shamir,et al. Cube Attacks on Tweakable Black Box Polynomials , 2009, IACR Cryptol. ePrint Arch..
[4] David A. Wagner,et al. Integral Cryptanalysis , 2002, FSE.
[5] Jan-Hendrik Evertse,et al. Linear Structures in Blockciphers , 1987, EUROCRYPT.
[6] Xuejia Lai,et al. On the security of multivariate hash functions , 2009 .
[7] Takeshi Kawabata,et al. Higher Order Differential Attacks on Reduced-Round MISTY1 , 2008, ICISC.
[8] Vincent Rijmen,et al. The Block Cipher Square , 1997, FSE.
[9] J. Massey,et al. Communications and Cryptography: Two Sides of One Tapestry , 1994 .
[10] Lars R. Knudsen,et al. Provable Security Against a Differential Attack , 1994 .
[11] Xuejia Lai. Higher Order Derivatives and Differential Cryptanalysis , 1994 .
[12] Lars R. Knudsen,et al. Truncated and Higher Order Differentials , 1994, FSE.
[13] Stefan Lucks. The Saturation Attack - A Bait for Twofish , 2000, FSE.
[14] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[15] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[16] Toshinobu Kaneko,et al. Improving the Higher Order Differential Attack and Cryptanalysis of the KN Cipher , 1997, ISW.
[17] Lars R. Knudsen,et al. The Interpolation Attack on Block Ciphers , 1997, FSE.
[18] S. Moriai,et al. Higher order differential attack of a CAST cipher , 1998 .