Cryptanalysis of substitution-permutation networks using key-dependent degeneracy (1996)

Cached

Download Links

by Howard M. Heys , Stafford E. Tavares
Venue:Cryptologia
Citations:1 - 0 self

Documents Related by Co-Citation

3 On the Optimal Diffusion Layer with Practical Security against – J S Kang, C S Park, S J Lee, J I Lim - 1999
3 Modeling Linear Characteristics of Substitution-Permutation Networks – Liam Keliher, Henk Meijer, Stafford Tavares - 2000
5 Towards provable security of substitution-permutation encryption networks – Z G Chen, S E Tavares - 1999
5 Properties of linear approximation tables, Fast Software Encryption – L O’Connor - 1995
3 Analysis and design of block ciphers – A M Youssef - 1997
3 Substitution-Permutation Network Cryptosystems Using Key-Dependent S-Boxes – Liam Keliher - 1997
3 Toward the true random cipher: On expected linear probability values for SPNs with randomly selected s-boxes, chapter – Liam Keliher, Henk Meijer, Stafford Tavares - 2003
1 The CAST-256 encryption algorithm, The First Advanced Encryption Standard Candidate – C Adams - 1998
1 E2—A candidate cipher for – M Kanda, S Moriai, K Aoki, H Ueda, M Ohkubo, Y Takashima, K Ohta, T Matsumoto - 1998
2 Q: A Proposal for – L McBride - 2000
3 An upper bound on the number of m-resilient boolean functions – C Carlet, A Gouget - 2002
6 Probabilistic Completeness of Substitution--Permutation Encryption Networks – F Ayoub - 1982
17 A formal and practical design procedure for substitution-permutation network cryptosystems – C M Adams - 1990
8 The design of complete encryption networks using cryptographically equivalent permutations – F Ayoub - 1982
3 Ciphers—Analysis, Design and Applications – Block - 1994
12 On the complexity of Matsui’s attack – Pascal Junod - 2001
29 Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis – Howard M. Heys, Stafford E. Tavares - 1996
10 Avalanche Characteristics of Substitution-Permutation Encryption Networks – H M Heys, S E Tavares - 1995
6 A strategy for constructing fast round functions with practical security against differential and linear cryptanalysis – M Kanda, Y Takashima, T Matsumoto, K Aoki, K Ohta - 1999