Search

Showing total 21 results

Search Constraints

Start Over You searched for: Topic block cipher Remove constraint Topic: block cipher Journal ieee transactions on information theory Remove constraint Journal: ieee transactions on information theory
21 results

Search Results

1. Classification of Bent Monomials, Constructions of Bent Multinomials and Upper Bounds on the Nonlinearity of Vectorial Functions.

2. Improving the Lower Bound on the Higher Order Nonlinearity of Boolean Functions With Prescribed Algebraic Immunity.

3. Constructions of Involutions Over Finite Fields.

4. Differential Properties of x\mapsto x^2^t-1.

5. On the Nonlinearity of Exponential Welch Costas Functions

6. Improving the Lower Bound on the Higher Order Nonlinearity of Boolean Functions With Prescribed Algebraic Immunity

7. A New Criterion for Nonlinearity of Block Ciphers

8. Provable Security Evaluation of Block Ciphers Against Demirci-Selçuk’s Meet-in-the-Middle Attack

9. C-Differentials, Multiplicative Uniformity, and (Almost) Perfect c-Nonlinearity

10. A Class of Quadrinomial Permutations With Boomerang Uniformity Four

11. On Random Read Access in ${\mathsf{OCB}}$

12. The Independence of Linear Approximations in Symmetric Cryptanalysis.

13. A Construction of Permutation Codes From Rational Function Fields and Improvement to the Gilbert–Varshamov Bound

14. Highly Nonlinear Balanced S-Boxes With Good Differential Properties

15. Revisiting the Security of the ALRED Design and Two of Its Variants: Marvin and LetterSoup

16. Multiproperty-Preserving Domain Extension Using Polynomial-Based Modes of Operation

17. Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis

18. Power of a Public Random Permutation and Its Application to Authenticated Encryption

19. Efficient Tweakable Enciphering Schemes From (Block-Wise) Universal Hash Functions

20. HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach

21. Information leakage of Feistel ciphers