Cryptanalysis of substitution-permutation networks using key-dependent degeneracy (1996)

Cached

Download Links

by Howard M. Heys , Stafford E. Tavares
Venue:Cryptologia
Citations:1 - 0 self

Active Bibliography

4 Linear cryptanalysis of substitution-permutation networks – Liam Keliher - 2003
1 On the Design of Secure Block Ciphers – Howard M. Heys, Stafford E. Tavares - 1994
24 Designing S-Boxes For Ciphers Resistant To Differential Cryptanalysis – Carlisle M. Adams, Stafford E. Tavares - 1993
29 Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis – Howard M. Heys, Stafford E. Tavares - 1996
21 Constructing symmetric ciphers using the CAST design procedure – Carlisle M. Adams - 1997
1 TWEAKABLE BLOCKCIPHERS SECURE AGAINST GENERIC EXPONENTIAL ATTACKS – Elizabeth A. Crump - 2007
PROPAGATION CHARACTERISTICS OF RC5, RC6 AND TWOFISH CIPHERS – Arıkan Savaş - 2003
4 Statistical Cryptanalysis of Block Ciphers – Pascal Junod - 2004
The Block Cipher: SEA2 With Provable Resistance Against DC and LC Attacks – Shih-hsu Chang, Fang-hsuan Cheng, Wen-hsing Hsu - 1999
A New Criterion For The Design Of 8×8 S-Boxes In Private-Key Ciphers – Jianhong Xu, Howard M. Heys
Designing Product Ciphers using Markov Chains – Luke O'Connor, Horst Feistel
A New Substitution-Permutation Network Cipher Using Key-Dependent S-Boxes – Liam Keliher, Henk Meijer - 1997
1 Known Plaintext Cryptanalysis of Tree-Structured Block Ciphers – H. M. Heys, S. E. Tavares - 1995
2 On Relationship among Avalanche, Nonlinearity, and Correlation Immunity – Yuliang Zheng, Xian-Mo Zhang - 2000
3 Modeling Linear Characteristics of Substitution-Permutation Networks – Liam Keliher, Henk Meijer, Stafford Tavares - 2000
3 Substitution-Permutation Network Cryptosystems Using Key-Dependent S-Boxes – Liam Keliher - 1997
3 A Study on the Construction and Analysis of Substitution Boxes for Symmetric Cryptosystems – Kwangjo Kim, For Symmetric Cryptosystems - 1990
3 Toward the true random cipher: On expected linear probability values for SPNs with randomly selected s-boxes, chapter – Liam Keliher, Henk Meijer, Stafford Tavares - 2003
1 F-HASH: Securing Hash Functions Using Feistel Chaining”, Cryptology ePrint Archive – Duo Lei