On the boomerang uniformity of (quadratic) permutations over F_2^n
release_ubxro22o5jhj5eekmoym7pxyli
by
Sihem Mesnager, Chunming Tang, Maosheng Xiong
References
NOTE: currently batch computed and may include additional references sources, or be missing recent changes, compared to entity reference list.Showing 1 - 26 of 26 references (in 422ms) | ||
---|---|---|
[b0] via grobid |
Thomas Beth and Cunsheng Ding. On almost perfect nonlinear permutations. In Tor Helleseth, editor, Advances in Cryptology -EUROCRYPT '93, pages 65-76, Berlin, Heidelberg, 1994. Springer Berlin Heidelberg.
| |
[b1] via grobid |
Carl Bracken and Gregor Leander. A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree. Finite Fields Appl., 16 , pp. 231-242, 2010.
| |
[b2] via grobid |
Celine Blondeau, Anne Canteaut, Pascale Charpin. Differential properties of power functions. Int. J. Inf. Coding Theory, 1 (2) (2010) 149-170.
| |
[b3] via fuzzy |
On the Boomerang Uniformity of Cryptographic Sboxes
Christina Boura, Anne Canteaut 2018 IACR Transactions on Symmetric Cryptology doi:10.46586/tosc.v2018.i3.290-310 |
web.archive.org [PDF]
|
[b4] via grobid |
Eli Biham, Orr Dunkelman, and Nathan Keller. The rectangle attack -rectangling the Serpent. In Birgit Pfitzmann, editor, EUROCRYPT 2001, volume 2045 of LNCS, pages 340-357. Springer, Heidelberg, May 2001.
| |
[b5] via grobid |
Eli Biham, Orr Dunkelman, and Nathan Keller. New results on boomerang and rectangle attacks. In Joan Daemen and Vincent Rijmen, editors, FSE 2002, volume 2365 of LNCS, pages 1-16. Springer, Heidelberg, February 2002.
| |
[b6] via grobid |
Eli Biham and Adi Shamir. Differential cryptanalysis of DES-like cryptosystems. In Alfred J. Menezes and Scott A. Vanstone, editors, CRYPTO'90, volume 537 of LNCS, pages 2-21. Springer, Heidelberg, August 1991.
| |
[b7] via grobid |
Alex Biryukov, Christophe De Cannière, and Gustaf Dellkrantz. Cryptanalysis of SAFER++. In Dan Boneh, editor, CRYPTO 2003, volume 2729 of LNCS, pages 195-211. Springer, Heidelberg, August 2003.
| |
[b8] via grobid |
Alex Biryukov and Dmitry Khovratovich. Related-key cryptanalysis of the full AES- 192 and AES-256. In Mitsuru Matsui, editor, ASIACRYPT 2009, volume 5912 of LNCS, pages 1-18. Springer, Heidelberg, December 2009.
| |
[b9] via grobid |
Carl Bracken, Chik How Tan, and Yin Tan. Binomial differentially 4 uniform permutations with high nonlinearity. Finite Fields and Their Applications, 18(3), pages 537-546, 2012.
| |
[b10] via grobid |
Lilya Budaghyan. Construction and analysis of cryptographic functions. New York, NY, USA: Springer-Verlag, 2014.
| |
[b11] via grobid |
Claude Carlet. Boolean Functions for Cryptography and Error Correcting Codes, Chapter of the monography Boolean Models and Methods in Mathematics, Com- puter Science, and Engineering, In Crama, Y., Hammer, P., (eds), pp. 257-397. Cambridge University Press, 2010.
| |
[b12] via grobid |
Claude Carlet. Vectorial Boolean Functions for Cryptography, Chapter of the monography Boolean Models and Methods in Mathematics, Computer Science, and Engineering, Crama, Y., Hammer, P., (eds), pp. 398-469, Cambridge Univer- sity Press, 2010.
| |
[b13] via grobid |
Claude Carlet, Pascale Charpin, and Victor Zinoviev. Codes, Bent Functions and Permutations Suitable For DES-like Cryptosystems. Des. Codes Cryptography, 15(2), pages 125-156, 1998.
| |
[b14] via grobid |
Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, and Ling Song. Boomerang connectivity table: A new cryptanalysis tool. In Jesper Buus Nielsen and Vincent Ri- jmen, editors, Advances in Cryptology -EUROCRYPT 2018, pages 683-714, Cham, 2018. Springer International Publishing.
| |
[b15] via grobid |
Hans Dobbertin. One-to-one highly nonlinear power functions on GF (2 n ). Appl. Algebra Engrg. Comm. Comput, 9, 139-152, 1998.
| |
[b16] via grobid |
Orr Dunkelman, Nathan Keller, and Adi Shamir. A practical-time related-key at- tack on the KASUMI cryptosystem used in GSM and 3G telephony. In Tal Rabin, editor, CRYPTO 2010, volume 6223 of LNCS, pages 393-410. Springer, -Heidelberg, August 2010.
| |
[b17] via grobid |
Robert Gold. Maximal recursive sequences with 3-valued recursive cross-correlation functions. IEEE Trans. Inform. Theory, 14(1):154-156, 1968.
| |
[b18] via grobid |
Tadao Kasami. The weight enumerators for several classes of subcodes of the second order binary Reed-Muller codes. Information and Control, 18, pp. 369-394, 1971.
| |
[b19] via grobid |
John Kelsey, Tadayoshi Kohno, and Bruce Schneier. Amplified boomerang attacks against reduced-round MARS and Serpent. In Bruce Schneier, editor, FSE 2000, 21. Jongsung Kim, Seokhie Hong, Bart Preneel, Eli Biham, Orr Dunkelman, and Nathan Keller. Related-Key Boomerang and Rectangle Attacks: Theory and Ex- perimental Analysis. IEEE Trans. Information Theory, 58(7):4948-4966, 2012.
| |
[b20] via grobid |
Kaisa Nyberg. S-boxes and round functions with controllable linearity and dif- ferential uniformity. In Bart Preneel, editor, FSE'94, volume 1008 of LNCS, pages 111-130. Springer, Heidelberg, December 1995.
| |
[b21] via fuzzy |
New Results about the Boomerang Uniformity of Permutation Polynomials
Kangquan Li, Longjiang Qu, Bing Sun, Chao Li 2019 IEEE Transactions on Information Theory doi:10.1109/tit.2019.2918531 | |
[b22] via grobid |
Kaisa Nyberg. Differentially uniform mappings for cryptography. In Tor Helle- seth, editor, Advances in Cryptology -EUROCRYPT '93, pages 55-64, Berlin, Heidelberg, 1994. Springer Berlin Heidelberg.
| |
[b23] via grobid |
Ling Song, Xianrui Qi, and Lei Hu. Boomerang Connectivity Table Revisited- Application to SKINNY and AES https://eprint.iacr.org/2019/146.pdf
| |
[b24] via grobid |
Michael E. Zieve. Permutation polynomials induced from permutations of subfields, and some complete sets of mutually orthogonal latin squares, arXiv: 1312.1325v3, 2013.
| |
[b25] via grobid |
David Wagner. The boomerang attack. In Lars R. Knudsen, editor, FSE'99, volume 1636 of LNCS, pages 156-170. Springer, Heidelberg, March 1999.
| |