Zero-correlation linear cryptanalysis of reduced-round LBlock (Englisch)
- Neue Suche nach: Soleimany, Hadi
- Neue Suche nach: Nyberg, Kaisa
- Neue Suche nach: Soleimany, Hadi
- Neue Suche nach: Nyberg, Kaisa
In:
Designs, Codes and Cryptography
;
73
, 2
; 683-698
;
2014
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:Zero-correlation linear cryptanalysis of reduced-round LBlock
-
Beteiligte:Soleimany, Hadi ( Autor:in ) / Nyberg, Kaisa ( Autor:in )
-
Erschienen in:Designs, Codes and Cryptography ; 73, 2 ; 683-698
-
Verlag:
- Neue Suche nach: Springer US
- Neue Suche nach: Kluwer
-
Erscheinungsort:Boston, Mass. [u.a.]
-
Erscheinungsdatum:2014
-
ISSN:
-
ZDBID:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 31.12 / 54.62 / 31.20
- Weitere Informationen zu Basisklassifikation
- Neue Suche nach: 770/3150
-
Schlagwörter:
-
Klassifikation:
-
Datenquelle:
Inhaltsverzeichnis – Band 73, Ausgabe 2
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 269
-
Editorial: special issue on coding and cryptographyBudaghyan, Lilya / Helleseth, Tor / Parker, Matthew et al. | 2014
- 271
-
On low weight codewords of generalized affine and projective Reed–Muller codesBallet, Stéphane / Rolland, Robert et al. | 2014
- 299
-
On the arithmetic Walsh coefficients of Boolean functionsCarlet, Claude / Klapper, Andrew et al. | 2014
- 319
-
On discrete Fourier transform, ambiguity, and Hamming-autocorrelation of pseudorandom sequencesPirsic, Gottlieb Isabel / Winterhof, Arne et al. | 2014
- 329
-
Linear covering codes and error-correcting codes for limited-magnitude errorsKløve, Torleiv / Schwartz, Moshe et al. | 2014
- 355
-
PotLLL: a polynomial time version of LLL with deep insertionsFontein, Felix / Schneider, Michael / Wagner, Urs et al. | 2014
- 369
-
New inequalities for -ary constant-weight codesKim, Hyun Kwang / Toan, Phan Thanh et al. | 2014
- 369
-
New inequalities for Formula Not Shown -ary constant-weight codesKim, H. K. / Toan, P. T. et al. | 2014
- 383
-
Small secret exponent attack on RSA variant with modulusSarkar, Santanu et al. | 2014
- 383
-
Small secret exponent attack on RSA variant with modulus Formula Not ShownSarkar, S. et al. | 2014
- 393
-
On the geometry of balls in the Grassmannian and list decoding of lifted Gabidulin codesRosenthal, Joachim / Silberstein, Natalia / Trautmann, Anna-Lena et al. | 2014
- 417
-
Quantum codes from nearly self-orthogonal quaternary linear codesLisoněk, Petr / Singh, Vijaykumar et al. | 2014
- 425
-
Wiretap lattice codes from number fields with no small norm elementsOng, Soon Sheng / Oggier, Frédérique et al. | 2014
- 441
-
Connections between Construction D and related constructions of latticesKositwattanarerk, Wittawat / Oggier, Frédérique et al. | 2014
- 457
-
On the exact number of solutions of certain linearized equationsÖzbudak, Ferruh / Saygı, Zülfükar et al. | 2014
- 469
-
Generation of full cycles by a composition of NLFSRsDubrova, Elena et al. | 2014
- 487
-
More differentially 6-uniform power functionsBlondeau, Céline / Perrin, Léo et al. | 2014
- 507
-
Multi-trial Guruswami–Sudan decoding for generalised Reed–Solomon codesNielsen, Johan S. R. / Zeh, Alexander et al. | 2014
- 529
-
Paillier-based publicly verifiable (non-interactive) secret sharingJhanwar, Mahabir Prasad / Venkateswarlu, Ayineedi / Safavi-Naini, Reihaneh et al. | 2014
- 547
-
List and unique error-erasure decoding of interleaved Gabidulin codes with interpolation techniquesWachter-Zeh, Antonia / Zeh, Alexander et al. | 2014
- 571
-
On transform-domain error and erasure correction by Gabidulin codesLi, Wenhui / Sidorenko, Vladimir / Silva, Danilo et al. | 2014
- 587
-
A matrix approach for constructing quadratic APN functionsYu, Yuyin / Wang, Mingsheng / Li, Yongqiang et al. | 2014
- 601
-
A new large class of functions not APN infinitely oftenCaullery, Florian et al. | 2014
- 615
-
On the rank of incidence matrices in projective Hjelmslev spacesLandjev, Ivan / Vandendriesche, Peter et al. | 2014
- 625
-
Improved algorithms for finding low-weight polynomial multiples in $$\mathbb {F}_{2}^{}[x]$$ and some cryptographic applicationsLöndahl, Carl / Johansson, Thomas et al. | 2014
- 625
-
Improved algorithms for finding low-weight polynomial multiples in Formula Not Shown and some cryptographic applicationsLöndahl, C. / Johansson, T. et al. | 2014
- 625
-
Improved algorithms for finding low-weight polynomial multiples in and some cryptographic applicationsLöndahl, Carl / Johansson, Thomas et al. | 2014
- 641
-
Distinguisher-based attacks on public-key cryptosystems using Reed–Solomon codesCouvreur, Alain / Gaborit, Philippe / Gauthier-Umaña, Valérie / Otmani, Ayoub / Tillich, Jean-Pierre et al. | 2014
- 667
-
Towards the optimality of Feistel ciphers with substitution-permutation functionsShibutani, Kyoji / Bogdanov, Andrey et al. | 2014
- 683
-
Zero-correlation linear cryptanalysis of reduced-round LBlockSoleimany, Hadi / Nyberg, Kaisa et al. | 2014
- 699
-
Exponents of polar codes using algebraic geometric code kernelsAnderson, Sarah E. / Matthews, Gretchen L. et al. | 2014