Ducas, Léo; Gibbons, Shane Hull attacks on the lattice isomorphism problem. (English) Zbl 1527.94033 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 177-204 (2023). MSC: 94A60 05C60 PDFBibTeX XMLCite \textit{L. Ducas} and \textit{S. Gibbons}, Lect. Notes Comput. Sci. 13940, 177--204 (2023; Zbl 1527.94033) Full Text: DOI
Barbero, Stefano; Bellini, Emanuele; Makarim, Rusydi H. Rotational analysis of ChaCha permutation. (English) Zbl 1521.94026 Adv. Math. Commun. 17, No. 6, 1422-1439 (2023). MSC: 94A60 05A05 11T71 68R05 PDFBibTeX XMLCite \textit{S. Barbero} et al., Adv. Math. Commun. 17, No. 6, 1422--1439 (2023; Zbl 1521.94026) Full Text: DOI arXiv
Canale, Federico; Leander, Gregor; Stennes, Lukas Simon’s algorithm and symmetric crypto: generalizations and automatized applications. (English) Zbl 1517.94076 Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13509, 779-808 (2022). MSC: 94A60 05B20 68P25 PDFBibTeX XMLCite \textit{F. Canale} et al., Lect. Notes Comput. Sci. 13509, 779--808 (2022; Zbl 1517.94076) Full Text: DOI
Schrottenloher, André; Stevens, Marc Simplified MITM modeling for permutations: new (quantum) attacks. (English) Zbl 1517.94152 Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13509, 717-747 (2022). MSC: 94A60 05A05 81P94 68P25 PDFBibTeX XMLCite \textit{A. Schrottenloher} and \textit{M. Stevens}, Lect. Notes Comput. Sci. 13509, 717--747 (2022; Zbl 1517.94152) Full Text: DOI
Dalai, Deepak Kumar; Pal, Santu; Sarkar, Santanu A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a. (English) Zbl 1485.94077 Des. Codes Cryptography 90, No. 3, 489-521 (2022). MSC: 94A60 11T71 05C50 97H60 PDFBibTeX XMLCite \textit{D. K. Dalai} et al., Des. Codes Cryptography 90, No. 3, 489--521 (2022; Zbl 1485.94077) Full Text: DOI
Agievich, S. V. On the guaranteed number of activations in \(\mathsf{XS}\)-circuits. (English) Zbl 1486.94072 Mat. Vopr. Kriptografii 12, No. 2, 7-20 (2021). MSC: 94A60 05C25 PDFBibTeX XMLCite \textit{S. V. Agievich}, Mat. Vopr. Kriptografii 12, No. 2, 7--20 (2021; Zbl 1486.94072) Full Text: DOI MNR
Courtois, N. T.; Grajek, M.; Rams, M. On weak rotors, Latin squares, linear algebraic representations, invariant differentials and cryptanalysis of enigma. (English) Zbl 1482.94047 Rad Hrvat. Akad. Znan. Umjet. 546, Mat. Znan. 25, 51-77 (2021). MSC: 94A60 68P25 20N05 05B15 13A50 PDFBibTeX XMLCite \textit{N. T. Courtois} et al., Rad Hrvat. Akad. Znan. Umjet., Mat. Znan. 546(25), 51--77 (2021; Zbl 1482.94047) Full Text: DOI
Vysotskaya, V. V. Some properties of modular addition. (English) Zbl 1478.94110 Mat. Vopr. Kriptografii 10, No. 2, 75-88 (2019). MSC: 94A60 05A15 05A10 11T71 PDFBibTeX XMLCite \textit{V. V. Vysotskaya}, Mat. Vopr. Kriptografii 10, No. 2, 75--88 (2019; Zbl 1478.94110) Full Text: DOI MNR
Lin, Yuan-Lung; Phoa, Frederick Kin Hing; Kao, Ming-Hung Circulant partial Hadamard matrices: construction via general difference sets and its application to fMRI experiments. (English) Zbl 1392.62236 Stat. Sin. 27, No. 4, 1715-1724 (2017). MSC: 62K10 05B10 PDFBibTeX XMLCite \textit{Y.-L. Lin} et al., Stat. Sin. 27, No. 4, 1715--1724 (2017; Zbl 1392.62236) Full Text: DOI Link
Malyshev, F. M.; Trifonov, D. I. Diffusion properties of XSLP-ciphers. (Russian. English summary) Zbl 1475.94136 Mat. Vopr. Kriptografii 7, No. 3, 47-60 (2016). MSC: 94A60 05A05 05A15 PDFBibTeX XMLCite \textit{F. M. Malyshev} and \textit{D. I. Trifonov}, Mat. Vopr. Kriptografii 7, No. 3, 47--60 (2016; Zbl 1475.94136) Full Text: DOI MNR
Carlet, Claude; Tan, Yin On group rings and some of their applications to combinatorics and symmetric cryptography. (English) Zbl 1456.94058 Int. J. Group Theory 4, No. 4, 61-74 (2015). MSC: 94A60 05E30 20C05 16S34 PDFBibTeX XMLCite \textit{C. Carlet} and \textit{Y. Tan}, Int. J. Group Theory 4, No. 4, 61--74 (2015; Zbl 1456.94058) Full Text: DOI
Shushuev, G. I. Finding the optimal linear approximation of Feistel network. (Russian. English summary) Zbl 07310237 Prikl. Diskretn. Mat. 2014, No. 1(23), 40-54 (2014). MSC: 90-XX 05-XX PDFBibTeX XMLCite \textit{G. I. Shushuev}, Prikl. Diskretn. Mat. 2014, No. 1(23), 40--54 (2014; Zbl 07310237) Full Text: MNR
Caballero-Gil, P.; Fúster-Sabater, A. A simple attack on some clock-controlled generators. (English) Zbl 1189.94043 Comput. Math. Appl. 58, No. 1, 179-188 (2009). MSC: 94A60 05C85 05C90 PDFBibTeX XMLCite \textit{P. Caballero-Gil} and \textit{A. Fúster-Sabater}, Comput. Math. Appl. 58, No. 1, 179--188 (2009; Zbl 1189.94043) Full Text: DOI
Blackburn, Simon R. Cryptanalysing the critical group: efficiently solving Biggs’s discrete logarithm problem. (English) Zbl 1183.94023 J. Math. Cryptol. 3, No. 3, 199-203 (2009). MSC: 94A60 05C50 PDFBibTeX XMLCite \textit{S. R. Blackburn}, J. Math. Cryptol. 3, No. 3, 199--203 (2009; Zbl 1183.94023) Full Text: DOI
Bard, Gregory V. Algebraic cryptanalysis. (English) Zbl 1183.94019 New York, NY: Springer (ISBN 978-0-387-88756-2/hbk; 978-0-387-88757-9/ebook). xxxiii, 356 p. (2009). Reviewer: Nicolae Constantinescu (Craiova) MSC: 94A60 11T71 05E99 15A30 08A99 PDFBibTeX XMLCite \textit{G. V. Bard}, Algebraic cryptanalysis. New York, NY: Springer (2009; Zbl 1183.94019) Full Text: DOI
González Vasco, María Isabel; Pérez García, David Attacking a public key cryptosystem based on tree replacement. (English) Zbl 1106.94022 Discrete Appl. Math. 155, No. 1, 61-67 (2007). MSC: 94A60 05C05 05C90 PDFBibTeX XMLCite \textit{M. I. González Vasco} and \textit{D. Pérez García}, Discrete Appl. Math. 155, No. 1, 61--67 (2007; Zbl 1106.94022) Full Text: DOI
Blackburn, Simon R.; Piper, Fred Applications of combinatorics to security. (English) Zbl 0888.94006 Mitchell, Chris (ed.), Applications of combinatorial mathematics. Based on the proceedings of a conference, Oxford, UK, December 14–16, 1994. Oxford: Clarendon Press. Inst. Math. Appl. Conf. Ser., New Ser. 60, 31-47 (1997). Reviewer: W.B.Müller (Klagenfurt) MSC: 94A60 05C90 11T71 PDFBibTeX XMLCite \textit{S. R. Blackburn} and \textit{F. Piper}, Inst. Math. Appl. Conf. Ser., New Ser. 60, 31--47 (1997; Zbl 0888.94006)
Golić, Jovan Dj. Constrained embedding probability for two binary strings. (English) Zbl 0879.05005 SIAM J. Discrete Math. 9, No. 3, 360-364 (1996). Reviewer: T.R.Walsh (Montreal) MSC: 05A15 11B37 94A60 94B50 PDFBibTeX XMLCite \textit{J. Dj. Golić}, SIAM J. Discrete Math. 9, No. 3, 360--364 (1996; Zbl 0879.05005) Full Text: DOI
Schnorr, C. P.; Vaudenav, S. Black box cryptanalysis of hash networks based on multipermutations. (English) Zbl 0909.94013 De Santis, Alfredo (ed.), Advances in cryptology - EUROCRYPT ’94. Workshop on the theory and application of cryptographic techniques, Perugia, Italy, May 9-12, 1994. Proceedings. Berlin: Springer-Verlag. Lect. Notes Comput. Sci. 950, 47-57 (1995). MSC: 94A60 68P25 05B15 PDFBibTeX XMLCite \textit{C. P. Schnorr} and \textit{S. Vaudenav}, Lect. Notes Comput. Sci. 950, 47--57 (1995; Zbl 0909.94013)