메뉴 건너뛰기




Volumn 1716, Issue , 1999, Pages 1-13

Probabilistic higher order differential attack and higher order bent functions

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; SECURITY OF DATA;

EID: 84956860766     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (23)

References (10)
  • 1
    • 0003508574 scopus 로고
    • Differential Cryptanalysis of the Data Encryption Standard
    • and
    • E.Biham and A.Shamir. Differential Cryptanalysis of the Data Encryption Standard. Springer-Verlag, 1993. 62
    • (1993) Springer-Verlag , pp. 62
    • Biham, E.1    Shamir, A.2
  • 3
    • 84957694404 scopus 로고    scopus 로고
    • Cryptanalysis of block ciphers with probabilistic non-linear relations of low degree.In
    • T.Jakobsen. Cryptanalysis of block ciphers with probabilistic non-linear relations of low degree. In Advances in Cryptology — CRYPTO’ 98 Proceedings, volume 1462 of Lecture Notes in Computer Science, pages 212–222, Springer-Verlag, 1998. 62
    • (1998) Advances in Cryptology — CRYPTO’ 98 Proceedings , vol.1462 , pp. 212-222
    • Jakobsen, T.1
  • 4
    • 84947929289 scopus 로고    scopus 로고
    • The interpolation attack on block ciphers. In
    • and, Springer-Verlag
    • T.Jakobsen and L.R.Knudsen. The interpolation attack on block ciphers. In Fast Software Encryption, volume 1267 of Lecture Notes in Computer Science, pages 28–40, Springer-Verlag, January 1997. 62, 64, 68
    • (1997) Fast Software Encryption , vol.1267 , Issue.64 , pp. 28-40
    • Jakobsen, T.1    Knudsen, L.R.2
  • 6
    • 0029632010 scopus 로고
    • Provable security against a differential attack. In
    • K.Nyberg and L.R.Knudsen. Provable security against a differential attack. In Journal of Cryptology, volume 8, number 1, pages 27–37, Winter 1995. 68
    • (1995) Journal of Cryptology , vol.8 , Issue.1 , pp. 27-37
    • Nyberg, K.1    Knudsen, L.R.2
  • 8
    • 85025704284 scopus 로고
    • Linear cryptanalysis method for DES cipher.In
    • Springer-Verlag
    • M.Matsui. Linear cryptanalysis method for DES cipher. In Advances in Cryptol-ogy — EUROCRYPT’ 93 Proceedings, volume 765 of Lecture Notes in Computer Science, pages 386–397, Springer-Verlag, 1993. 64
    • (1993) Advances in Cryptol-Ogy — EUROCRYPT’ 93 Proceedings , vol.765 , pp. 386-397
    • Matsui, M.1
  • 9
    • 0018529746 scopus 로고
    • The covering radius of the (M − 3)-rd order Reed-Muller codes and lower bounds on the (m − 4)-th order Reed-Muller codes. In
    • A.M.McLoughlin. The covering radius of the (m − 3)-rd order Reed-Muller codes and lower bounds on the (m − 4)-th order Reed-Muller codes. In SIAM Journal of Applied Mathematics, volume 37, number 2, October 1979. 71
    • (1979) SIAM Journal of Applied Mathematics , vol.37 , Issue.2 , pp. 71
    • Mc Loughlin, A.M.1
  • 10
    • 0024106741 scopus 로고
    • Towards effective nonlinear cryptosystem design
    • and
    • J.Pieprzyk and G.Finkelstein. Towards effective nonlinear cryptosystem design. In IEE Proceedings Part E, volume 35, number 6, pages 325–335, November 1988.
    • (1988) IEE Proceedings Part E , vol.35 , Issue.6 , pp. 325-335
    • Pieprzyk, J.1    Finkelstein, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.