Uneingeschränkter Zugang

Correlation Distribution Analysis of a Two-Round Key-Alternating Block Cipher


Zitieren

[1] ABDELRAHEEM, M. A.—AGREN, M.—BEELEN, P.—LEANDER, G.: On the distribution of linear biases: three instructive examples. In: Advances in Cryptology–CRYPTO ’12, Lecture Notes in Comput. Sci., Vol. 7417, Springer-Verlag, Berlin, 2012, pp. 50–67.10.1007/978-3-642-32009-5_4Search in Google Scholar

[2] ALBRECHT, M.—GRASSI, L.—RECHBERGER, C.—ROY, A.—TIESSEN, T.: MiMC: Efficient encryption and cryptographic hashing with minimal multiplicative complexity. In: Advances in cryptology—ASIACRYPT 2016. Lecture Notes in Comput. Sci. Vol. 10031, Part I. Springer-Verlag, Berlin, 2016, pp.191–219.10.1007/978-3-662-53887-6_7Search in Google Scholar

[3] ARNAULT, F., PICKETT, E.J., VINATIER, S.: Construction of self-dual normal bases and their complexity, Finite Fields Appl. 18 (2012), no. 2, 458–472.10.1016/j.ffa.2011.10.002Search in Google Scholar

[4] COULTER, R. S.: On the evaluation of a class of Weil sums in characteristic 2, New Zealand J. Math. 28 (1999), 171–184.Search in Google Scholar

[5] DAEMEN, J.—GOVAERTS, R.—VANDEWALLE, J.: Correlation matrices. In: Fast Software Encryption (FSE) 1994, Lecture Notes in Comput. Sci. Vol. 1008, Springer-Verlag, Berlin, 1995, pp. 275–285.10.1007/3-540-60590-8_21Search in Google Scholar

[6] DAEMEN, J.—RIJMEN, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Springer-Verlag, Berlin, 2002.10.1007/978-3-662-04722-4_1Search in Google Scholar

[7] _____ Probability distributions of correlation and differentials in block ciphers, J.Math. Cryptol. 1(3) (2007), 221–242.10.1515/JMC.2007.011Search in Google Scholar

[8] _____ Correlation Analysis in GF (2n). In: Cryptology and Iinformation security series Vol. 7 (P. Junod, A. Canteaut, eds.), IOS Press, 2011, pp. 115–131.Search in Google Scholar

[9] KRALEVA, L.: Key-dependent Correlation Distribution for Cube Cipher, MasterThesis, 2017.Search in Google Scholar

[10] LEMPEL, A.—WEINBERGER, M.: Self-complementary normal bases in finite fields, SIAM J. Discrete. Math. 1 (1988), no. 2, 193–198.10.1137/0401021Search in Google Scholar

[11] LIDL, R.—NIEDERREITER, H.: Finite fields, With a foreword by P. M. Cohn. In: Encyclopedia of Mathematics and Its Applications, Vol. 20, Addison Wesley Publishing Company, Advanced Book Program, Reading, MA, 1983.Search in Google Scholar

[12] MATSUI, M.: Linear cryptanalysis method for DES cipher. In: Advances in Cryptology-EUROCRYPT ’93 (Workshop on the theory and application of cryptographic techniques, Lofthus, Norway, May 23–27, 1993) (H. Tor, ed.), Lecture Notes in Comput. Sci. Vol. 765, Springer-Verlag, Berlin, 1994, pp. 386–397.10.1007/3-540-48285-7_33Search in Google Scholar

[13] MULLEN, G.—PANARIO, D.: Handbook of Finite Fields. In: Discrete Mathematics and its Applications. CRC Press, 2013.10.1201/b15006Search in Google Scholar

[14] PLESS, V. S.—HUFFMAN, W. C.: Handbook of Coding Theory. Elsevier, Amsterdam, 1998.Search in Google Scholar

eISSN:
1210-3195
Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
3 Hefte pro Jahr
Fachgebiete der Zeitschrift:
Mathematik, Allgemeines