-
1
-
-
0026397734
-
Differential cryptanalysis of DES-like cryptosystems
-
E. Biham and A. Shamir. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, Vol. 4, No. 1:3–72, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.1
, pp. 3-72
-
-
Biham, E.1
Shamir, A.2
-
2
-
-
0002011049
-
On correlation-immune functions
-
Springer-Verlag, Berlin, Heidelberg, New York
-
P. Camion, C. Carlet, P. Charpin, and N. Sendrier. On correlation-immune functions. In Advances in Cryptology -CRYPTO’91, volume 576 of Lecture Notes in Computer Science, pages 87–100. Springer-Verlag, Berlin, Heidelberg, New York, 1991.
-
(1991)
Advances in Cryptology -CRYPTO’91, Volume 576 of Lecture Notes in Computer Science
, pp. 87-100
-
-
Camion, P.1
Carlet, C.2
Charpin, P.3
Sendrier, N.4
-
3
-
-
84957632021
-
On the propagation criterion of degree l and order k
-
Springer-Verlag, Berlin, Heidelberg, New York
-
C. Carlet and P. Codes. On the propagation criterion of degree l and order k. In Advances in Cryptology -EUROCRYPT’98, volume 1403 of Lecture Notes in Computer Science, pages 462–474. Springer-Verlag, Berlin, Heidelberg, New York, 1998.
-
(1998)
Advances in Cryptology -EUROCRYPT’98, Volume 1403 of Lecture Notes in Computer Science
, pp. 462-474
-
-
Carlet, C.1
Codes, P.2
-
4
-
-
0002251636
-
Partially-bent functions. Designs
-
Claude Carlet. Partially-bent functions. Designs, Codes and Cryptography, 3:135–145, 1993.
-
(1993)
Codes and Cryptography
, vol.3
, pp. 135-145
-
-
Carlet, C.1
-
6
-
-
0001820140
-
Cryptography and computer privacy
-
H. Feistel. Cryptography and computer privacy. Scientific American, 228(5):15–23, 1973.
-
(1973)
Scientific American
, vol.228
, Issue.5
, pp. 15-23
-
-
Feistel, H.1
-
7
-
-
0024001951
-
A spectral characterization of correlationimmune combining functions
-
Xiao Guo-Zhen and J. L. Massey. A spectral characterization of correlationimmune combining functions. IEEE Transactions on Information Theory, 34(3):569–571, 1988.
-
(1988)
IEEE Transactions on Information Theory
, vol.34
, Issue.3
, pp. 569-571
-
-
Guo-Zhen, X.1
Massey, J.L.2
-
9
-
-
85025704284
-
Linear cryptanalysis method for DESc ipher
-
Springer-Verlag, Berlin, Heidelberg, New York
-
M. Matsui. Linear cryptanalysis method for DESc ipher. In Advances in Cryptology -EUROCRYPT’93, volume 765 of Lecture Notes in Computer Science, pages 386–397. Springer-Verlag, Berlin, Heidelberg, New York, 1994.
-
(1994)
Advances in Cryptology -EUROCRYPT’93, Volume 765 of Lecture Notes in Computer Science
, pp. 386-397
-
-
Matsui, M.1
-
10
-
-
84962928435
-
Nonlinearity criteria for cryptographic functions
-
Springer-Verlag, Berlin, Heidelberg, New York
-
W. Meier and O. Staffelbach. Nonlinearity criteria for cryptographic functions. In Advances in Cryptology -EUROCRYPT’89, volume 434 of Lecture Notes in Computer Science, pages 549–562. Springer-Verlag, Berlin, Heidelberg, New York, 1990
-
(1990)
Advances in Cryptology -EUROCRYPT’89, Volume 434 of Lecture Notes in Computer Science
, pp. 549-562
-
-
Meier, W.1
Staffelbach, O.2
-
11
-
-
85027157211
-
On the construction of highly nonlinear permutations
-
Springer-Verlag, Berlin, Heidelberg, New York
-
K. Nyberg. On the construction of highly nonlinear permutations. In Advances in Cryptology -EUROCRYPT’92, volume 658 of Lecture Notes in Computer Science, pages 92–98. Springer-Verlag, Berlin, Heidelberg, New York, 1993.
-
(1993)
Advances in Cryptology -EUROCRYPT’92, Volume 658 of Lecture Notes in Computer Science
, pp. 92-98
-
-
Nyberg, K.1
-
12
-
-
84955621100
-
Propagation characteristics of boolean functions
-
Springer-Verlag, Berlin, Heidelberg, New York
-
B. Preneel, W. V. Leekwijck, L. V. Linden, R. Govaerts, and J. Vandewalle. Propagation characteristics of boolean functions. In Advances in Cryptology -EUROCRYPT’ 90, volume 437 of Lecture Notes in Computer Science, pages 155–165. Springer-Verlag, Berlin, Heidelberg, New York, 1991.
-
(1991)
Advances in Cryptology -EUROCRYPT’ 90, Volume 437 of Lecture Notes in Computer Science
, pp. 155-165
-
-
Preneel, B.1
Leekwijck, W.V.2
Linden, L.V.3
Govaerts, R.4
Vandewalle, J.5
-
14
-
-
85007446434
-
On constructions and nonlinearity of correlation immune functions
-
Springer-Verlag, Berlin, Heidelberg, New York
-
J. Seberry, X. M. Zhang, and Y. Zheng. On constructions and nonlinearity of correlation immune functions. In Advances in Cryptology -EUROCRYPT’93, volume 765 of Lecture Notes in Computer Science, pages 181–199. Springer-Verlag, Berlin, Heidelberg, New York, 1994.
-
(1994)
Advances in Cryptology -EUROCRYPT’93, Volume 765 of Lecture Notes in Computer Science
, pp. 181-199
-
-
Seberry, J.1
Zhang, X.M.2
Zheng, Y.3
-
15
-
-
0012473975
-
Nonlinearity and propagation characteristics of balanced boolean functions
-
J. Seberry, X. M. Zhang, and Y. Zheng. Nonlinearity and propagation characteristics of balanced boolean functions. Information and Computation, 119(1):1–13, 1995.
-
(1995)
Information and Computation
, vol.119
, Issue.1
, pp. 1-13
-
-
Seberry, J.1
Zhang, X.M.2
Zheng, Y.3
-
16
-
-
84890522850
-
Communications theory of secrecy system. Bell Sys. Tech
-
C. E. Shannon. Communications theory of secrecy system. Bell Sys. Tech. Journal, Vol. 28:656–751, 1949.
-
(1949)
Journal
, vol.28
, pp. 656-751
-
-
Shannon, C.E.1
-
17
-
-
0021489155
-
Correlation-immunity of nonlinear combining functions for cryptographic applications
-
IT-30 No. 5
-
T. Siegenthaler. Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Transactions on Information Theory, IT-30 No. 5:776–779, 1984.
-
(1984)
IEEE Transactions on Information Theory
, pp. 776-779
-
-
Siegenthaler, T.1
-
18
-
-
85020573990
-
On the design of S-boxes
-
Springer-Verlag, Berlin, Heidelberg, New York
-
A. F. Webster and S. E. Tavares. On the design of S-boxes. In Advances in Cryptology -CRYPTO’85, volume 219 of Lecture Notes in Computer Science, pages 523–534. Springer-Verlag, Berlin, Heidelberg, New York, 1986.
-
(1986)
Advances in Cryptology -CRYPTO’85, Volume 219 of Lecture Notes in Computer Science
, pp. 523-534
-
-
Webster, A.F.1
Tavares, S.E.2
-
20
-
-
84947941488
-
Auto-correlations and new bounds on the nonlinearity of boolean functions
-
Springer-Verlag, Berlin, Heidelberg, New York
-
X. M. Zhang and Y. Zheng. Auto-correlations and new bounds on the nonlinearity of boolean functions. In Advances in Cryptology -EUROCRYPT’96, volume 1070 of Lecture Notes in Computer Science, pages 294–306. Springer-Verlag, Berlin, Heidelberg, New York, 1996.
-
(1996)
Advances in Cryptology -EUROCRYPT’96, Volume 1070 of Lecture Notes in Computer Science
, pp. 294-306
-
-
Zhang, X.M.1
Zheng, Y.2
-
21
-
-
0001331280
-
Characterizing the structures of cryptographic functions satisfying the propagation criterion for almost all vectors
-
special issue dedicated to Gus Simmons
-
X. M. Zhang and Y. Zheng. Characterizing the structures of cryptographic functions satisfying the propagation criterion for almost all vectors. Design, Codes and Cryptography, 7(1/2):111–134, 1996. special issue dedicated to Gus Simmons.
-
(1996)
Design, Codes and Cryptography
, vol.7
, Issue.1-2
, pp. 111-134
-
-
Zhang, X.M.1
Zheng, Y.2
-
24
-
-
84958623161
-
Plateaued functions
-
Springer-Verlag, Berlin, Heidelberg, New York
-
Y. Zheng and X. M. Zhang. Plateaued functions. In Advances in Cryptology -ICICS’99, volume 1726 of Lecture Notes in Computer Science, pages 284–300. Springer-Verlag, Berlin, Heidelberg, New York, 1999.
-
(1999)
Advances in Cryptology -ICICS’99, Volume 1726 of Lecture Notes in Computer Science
, pp. 284-300
-
-
Zheng, Y.1
Zhang, X.M.2
-
25
-
-
0001136230
-
Improved upper bound on the nonlinearity of high order correlation immune functions
-
volume xxxx of Lecture Notes in Computer Science, pages xxx–xxx. Springer-Verlag, Berlin, Heidelberg, New York, 2000. now in Preceedings
-
Y. Zheng and X. M. Zhang. Improved upper bound on the nonlinearity of high order correlation immune functions. In Selected Areas in Cryptography, 7th Annual International Workshop, SAC2000, volume xxxx of Lecture Notes in Computer Science, pages xxx–xxx. Springer-Verlag, Berlin, Heidelberg, New York, 2000. now in Preceedings pages 258-269.
-
Selected Areas in Cryptography, 7Th Annual International Workshop, SAC2000
, pp. 258-269
-
-
Zheng, Y.1
Zhang, X.M.2
-
26
-
-
22844456844
-
Strong linear dependence and unbiased distribution of non-propagative vectors
-
Springer-Verlag, Berlin, Heidelberg, New York
-
Y. Zheng and X. M. Zhang. Strong linear dependence and unbiased distribution of non-propagative vectors. In Selected Areas in Cryptography, 6th Annual International Workshop, SAC’99, volume 1758 of Lecture Notes in Computer Science, pages 92–105. Springer-Verlag, Berlin, Heidelberg, New York, 2000.
-
(2000)
Selected Areas in Cryptography, 6Th Annual International Workshop, SAC’99, Volume 1758 of Lecture Notes in Computer Science
, pp. 92-105
-
-
Zheng, Y.1
Zhang, X.M.2
|