Xu, Ying; Du, Xiaoni; Jia, Meichun; Wang, Xiangyu; Zou, Jian Quantum attacks on generalized Feistel networks based on the strong-weak separability. (English) Zbl 07763930 Quantum Inf. Process. 22, No. 10, Paper No. 375, 25 p. (2023). MSC: 81P68 PDFBibTeX XMLCite \textit{Y. Xu} et al., Quantum Inf. Process. 22, No. 10, Paper No. 375, 25 p. (2023; Zbl 07763930) Full Text: DOI
Fedchenko, V. A. On the linear and differential cryptanalysis of the AES-like ciphers. (Russian. English summary) Zbl 1473.94096 Mat. Vopr. Kriptografii 11, No. 3, 101-120 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{V. A. Fedchenko}, Mat. Vopr. Kriptografii 11, No. 3, 101--120 (2020; Zbl 1473.94096) Full Text: DOI MNR
Gerault, David; Lafourcade, Pascal; Minier, Marine; Solnon, Christine Computing AES related-key differential characteristics with constraint programming. (English) Zbl 1482.94049 Artif. Intell. 278, Article ID 103183, 24 p. (2020). MSC: 94A60 90C30 PDFBibTeX XMLCite \textit{D. Gerault} et al., Artif. Intell. 278, Article ID 103183, 24 p. (2020; Zbl 1482.94049) Full Text: DOI HAL
Chang, Donghoon; Ghosh, Mohona; Jati, Arpan; Kumar, Abhishek; Sanadhya, Somitra Kumar eSPF: a family of format-preserving encryption algorithms using MDS matrices. (English) Zbl 1506.94030 Ali, Sk Subidh (ed.) et al., Security, privacy, and applied cryptography engineering. 7th international conference, SPACE 2017, Goa, India, December 13–17, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10662, 133-150 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Chang} et al., Lect. Notes Comput. Sci. 10662, 133--150 (2017; Zbl 1506.94030) Full Text: DOI
Fedchenko, V. A. Diffusion rates of linear medium in AES-like ciphers. (Russian. English summary) Zbl 1475.94118 Mat. Vopr. Kriptografii 8, No. 3, 109-126 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{V. A. Fedchenko}, Mat. Vopr. Kriptografii 8, No. 3, 109--126 (2017; Zbl 1475.94118) Full Text: DOI MNR
Ashur, Tomer; Rijmen, Vincent On linear hulls and trails. (English) Zbl 1394.94927 Dunkelman, Orr (ed.) et al., Progress in cryptology – INDOCRYPT 2016. 17th international conference on cryptology in India, Kolkata, India, December 11–14, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-49889-8/pbk; 978-3-319-49890-4/ebook). Lecture Notes in Computer Science 10095, 269-286 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Ashur} and \textit{V. Rijmen}, Lect. Notes Comput. Sci. 10095, 269--286 (2016; Zbl 1394.94927) Full Text: DOI Link
Derbez, Patrick; Fouque, Pierre-Alain Automatic search of meet-in-the-middle and impossible differential attacks. (English) Zbl 1372.94422 Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-53007-8/pbk; 978-3-662-53008-5/ebook). Lecture Notes in Computer Science 9815, 157-184 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Derbez} and \textit{P.-A. Fouque}, Lect. Notes Comput. Sci. 9815, 157--184 (2016; Zbl 1372.94422) Full Text: DOI
Blondeau, Céline; Nyberg, Kaisa Perfect nonlinear functions and cryptography. (English) Zbl 1372.94413 Finite Fields Appl. 32, 120-147 (2015). Reviewer: Alexander Pott (Magdeburg) MSC: 94A60 94-02 11T71 PDFBibTeX XMLCite \textit{C. Blondeau} and \textit{K. Nyberg}, Finite Fields Appl. 32, 120--147 (2015; Zbl 1372.94413) Full Text: DOI
Sun, Siwei; Hu, Lei; Wang, Peng; Qiao, Kexin; Ma, Xiaoshuang; Song, Ling Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers. (English) Zbl 1306.94093 Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 158-178 (2014). MSC: 94A60 90C11 PDFBibTeX XMLCite \textit{S. Sun} et al., Lect. Notes Comput. Sci. 8873, 158--178 (2014; Zbl 1306.94093) Full Text: DOI
Shibutani, Kyoji; Bogdanov, Andrey Towards the optimality of Feistel ciphers with substitution-permutation functions. (English) Zbl 1310.94168 Des. Codes Cryptography 73, No. 2, 667-682 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Shibutani} and \textit{A. Bogdanov}, Des. Codes Cryptography 73, No. 2, 667--682 (2014; Zbl 1310.94168) Full Text: DOI
Shakiba, Mohsen; Dakhilalian, Mohammad; Mala, Hamid On computational complexity of impossible differential cryptanalysis. (English) Zbl 1371.94655 Inf. Process. Lett. 114, No. 5, 252-255 (2014). MSC: 94A60 68Q25 PDFBibTeX XMLCite \textit{M. Shakiba} et al., Inf. Process. Lett. 114, No. 5, 252--255 (2014; Zbl 1371.94655) Full Text: DOI
Lu, Jiqiang; Wei, Yongzhuang; Kim, Jongsung; Pasalic, Enes The higher-order meet-in-the-middle attack and its application to the Camellia block cipher. (English) Zbl 1291.94120 Theor. Comput. Sci. 527, 102-122 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Lu} et al., Theor. Comput. Sci. 527, 102--122 (2014; Zbl 1291.94120) Full Text: DOI
Li, Ruilin; Li, Chao; Su, Jinshu; Sun, Bing Security evaluation of MISTY structure with SPN round function. (English) Zbl 1364.94553 Comput. Math. Appl. 65, No. 9, 1264-1279 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Li} et al., Comput. Math. Appl. 65, No. 9, 1264--1279 (2013; Zbl 1364.94553) Full Text: DOI
Poschmann, Axel; Yap, Huihui Yap; Khoo, Khoongming Parallelisable variants of Camellia and SMS4 block cipher: p-Camellia and p-SMS4. (English) Zbl 1307.94087 Int. J. Appl. Cryptogr. 3, No. 1, 1-20 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Poschmann} et al., Int. J. Appl. Cryptogr. 3, No. 1, 1--20 (2013; Zbl 1307.94087) Full Text: DOI
Lu, Jiqiang; Wei, Yongzhuang; Kim, Jongsung; Pasalic, Enes The higher-order meet-in-the-middle attack and its application to the Camellia block cipher. (English) Zbl 1295.94110 Galbraith, Steven (ed.) et al., Progress in cryptology – INDOCRYPT 2012. 13th international conference on cryptology in India, Kolkata, India, December 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34930-0/pbk). Lecture Notes in Computer Science 7668, 244-264 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Lu} et al., Lect. Notes Comput. Sci. 7668, 244--264 (2012; Zbl 1295.94110) Full Text: DOI
Wang, Qingju; Bogdanov, Andrey The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers. (English) Zbl 1243.94031 Inf. Process. Lett. 112, No. 11, 427-432 (2012). MSC: 94A60 68M10 68P25 PDFBibTeX XMLCite \textit{Q. Wang} and \textit{A. Bogdanov}, Inf. Process. Lett. 112, No. 11, 427--432 (2012; Zbl 1243.94031) Full Text: DOI Link
Bouillaguet, Charles; Dunkelman, Orr; Fouque, Pierre-Alain; Leurent, Gaëtan New insights on impossible differential cryptanalysis. (English) Zbl 1292.94037 Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 243-259 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Bouillaguet} et al., Lect. Notes Comput. Sci. 7118, 243--259 (2012; Zbl 1292.94037) Full Text: DOI
Sung, Jaechul Differential cryptanalysis of eight-round SEED. (English) Zbl 1260.94056 Inf. Process. Lett. 111, No. 10, 474-478 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Sung}, Inf. Process. Lett. 111, No. 10, 474--478 (2011; Zbl 1260.94056) Full Text: DOI
Biryukov, Alex; Nikolić, Ivica Search for related-key differential characteristics in DES-like ciphers. (English) Zbl 1282.94033 Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 18-34 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Biryukov} and \textit{I. Nikolić}, Lect. Notes Comput. Sci. 6733, 18--34 (2011; Zbl 1282.94033) Full Text: DOI
Wu, Wenling; Zhang, Lei LBlock: a lightweight block cipher. (English) Zbl 1250.94047 Lopez, Javier (ed.) et al., Applied cryptography and network security. 9th international conference, ACNS 2011, Nerja, Spain, June 7–10, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21553-7/pbk). Lecture Notes in Computer Science 6715, 327-344 (2011). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{W. Wu} and \textit{L. Zhang}, Lect. Notes Comput. Sci. 6715, 327--344 (2011; Zbl 1250.94047) Full Text: DOI
Bogdanov, Andrey On the differential and linear efficiency of balanced Feistel networks. (English) Zbl 1234.94030 Inf. Process. Lett. 110, No. 20, 861-866 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Bogdanov}, Inf. Process. Lett. 110, No. 20, 861--866 (2010; Zbl 1234.94030) Full Text: DOI
Stankovski, Paul Greedy distinguishers and nonrandomness detectors. (English) Zbl 1294.94078 Gong, Guang (ed.) et al., Progress in cryptology – INDOCRYPT 2010. 11th international conference on cryptology in India, Hyderabad, India, December 12–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17400-1/pbk). Lecture Notes in Computer Science 6498, 210-226 (2010). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{P. Stankovski}, Lect. Notes Comput. Sci. 6498, 210--226 (2010; Zbl 1294.94078) Full Text: DOI Link
Biryukov, Alex; Nikolić, Ivica Automatic search for related-key differential characteristics in byte-oriented block ciphers: application to AES, Camellia, Khazad and others. (English) Zbl 1280.94041 Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 322-344 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Biryukov} and \textit{I. Nikolić}, Lect. Notes Comput. Sci. 6110, 322--344 (2010; Zbl 1280.94041) Full Text: DOI
Wu, Wenling; Zhang, Lei; Zhang, Wentao Improved impossible differential cryptanalysis of reduced-round Camellia. (English) Zbl 1256.94069 Avanzi, Roberto Maria (ed.) et al., Selected areas in cryptography. 15th international workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14–15. Revised selected papers. Berlin: Springer (ISBN 978-3-642-04158-7/pbk). Lecture Notes in Computer Science 5381, 442-456 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{W. Wu} et al., Lect. Notes Comput. Sci. 5381, 442--456 (2009; Zbl 1256.94069) Full Text: DOI
Nalini, N.; Rao, G. Raghavendra Attacks of simple block ciphers via efficient heuristics. (English) Zbl 1116.68036 Inf. Sci. 177, No. 12, 2553-2569 (2007). MSC: 68P25 68T20 PDFBibTeX XMLCite \textit{N. Nalini} and \textit{G. R. Rao}, Inf. Sci. 177, No. 12, 2553--2569 (2007; Zbl 1116.68036) Full Text: DOI
Xiao, Lu; Heys, Howard M. A simple power analysis attack against the key schedule of the Camellia block cipher. (English) Zbl 1192.68246 Inf. Process. Lett. 95, No. 3, 409-412 (2005). MSC: 68P25 PDFBibTeX XMLCite \textit{L. Xiao} and \textit{H. M. Heys}, Inf. Process. Lett. 95, No. 3, 409--412 (2005; Zbl 1192.68246) Full Text: DOI
Biryukov, Alex; De Cannière, Christophe; Braeken, An; Preneel, Bart A toolbox for cryptanalysis: Linear and affine equivalence algorithms. (English) Zbl 1038.94521 Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 33-50 (2003). MSC: 94A60 68P25 94A17 PDFBibTeX XMLCite \textit{A. Biryukov} et al., Lect. Notes Comput. Sci. 2656, 33--50 (2003; Zbl 1038.94521) Full Text: Link
Sugita, Makoto; Kobara, Kazukuni; Imai, Hideki Security of reduced version of the block cipher Camellia against truncated and impossible differential cryptanalysis. (English) Zbl 1062.94554 Boyd, Colin (ed.), Advances in cryptology - ASIACRYPT 2001. 7th international conference on the theory and application of cryptology and information security, Gold Coast, Australia, December 9–13, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42987-5). Lect. Notes Comput. Sci. 2248, 193-207 (2001). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Sugita} et al., Lect. Notes Comput. Sci. 2248, 193--207 (2001; Zbl 1062.94554) Full Text: Link