Search

Showing total 25 results

Search Constraints

Start Over You searched for: Search Limiters Full Text Remove constraint Search Limiters: Full Text Topic block ciphers Remove constraint Topic: block ciphers Journal ieee transactions on information theory Remove constraint Journal: ieee transactions on information theory
25 results

Search Results

1. On CCZ-Equivalence of the Inverse Function.

2. Structural and Statistical Analysis of Multidimensional Linear Approximations of Random Functions and Permutations.

3. Proof of Mirror Theory for ξ max = 2.

4. Provable Security Evaluation of Block Ciphers Against Demirci-Selçuk’s Meet-in-the-Middle Attack.

5. Generalized Plateaued Functions and Admissible (Plateaued) Functions.

6. C-Differentials, Multiplicative Uniformity, and (Almost) Perfect c-Nonlinearity.

7. Constructing Differentially 4-Uniform Permutations Over \BBF2^{2k} via the Switching Method.

8. A Class of Quadrinomial Permutations With Boomerang Uniformity Four.

9. On Random Read Access in ${\mathsf{OCB}}$.

10. Constructions of Involutions Over Finite Fields.

11. Highly Nonlinear Balanced S-Boxes With Good Differential Properties.

12. A Generalisation of Dillon's APN Permutation With the Best Known Differential and Nonlinear Properties for All Fields of Size 2^4k+2.

13. An Improvement on the Gilbert–Varshamov Bound for Permutation Codes.

14. On Compression of Data Encrypted With Block Ciphers.

15. Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis.

16. Low-Data Complexity Attacks on AES.

17. Revisiting the Security of the ALRED Design and Two of Its Variants: Marvin and LetterSoup.

18. Arithmetic Correlations and Walsh Transforms.

19. On the Structure of Format Preserving Sets in the Diffusion Layer of Block Ciphers.

20. The c -Differential Uniformity and Boomerang Uniformity of Two Classes of Permutation Polynomials.

21. Differential Properties of x\mapsto x^2^t-1.

22. Systematic Security Analysis of Stream Encryption With Key Erasure.

23. Covert and Secret Key Expansion Over Quantum Channels Under Collective Attacks.

24. On the Influence of the Algebraic Degree of F^-1 on the Algebraic Degree of G \circ F.

25. The Return of the Cryptographic Boomerang.