On the boomerang uniformity of (quadratic) permutations over F_2^n release_ubxro22o5jhj5eekmoym7pxyli

by Sihem Mesnager, Chunming Tang, Maosheng Xiong

References

NOTE: currently batch computed and may include additional references sources, or be missing recent changes, compared to entity reference list.
Fuzzy reference matching is a work in progress!
Read more about quality, completeness, and caveats in the fatcat guide.
Showing 1 - 26 of 26 references (in 422ms)
[b0]

via grobid
Thomas Beth and Cunsheng Ding. On almost perfect nonlinear permutations. In Tor Helleseth, editor, Advances in Cryptology -EUROCRYPT '93, pages 65-76, Berlin, Heidelberg, 1994. Springer Berlin Heidelberg.
[b1]

via grobid
Carl Bracken and Gregor Leander. A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree. Finite Fields Appl., 16 , pp. 231-242, 2010.
[b2]

via grobid
Celine Blondeau, Anne Canteaut, Pascale Charpin. Differential properties of power functions. Int. J. Inf. Coding Theory, 1 (2) (2010) 149-170.
[b3]

via fuzzy
On the Boomerang Uniformity of Cryptographic Sboxes
Christina Boura, Anne Canteaut
2018   IACR Transactions on Symmetric Cryptology
doi:10.46586/tosc.v2018.i3.290-310 
web.archive.org [PDF]
[b4]

via grobid
Eli Biham, Orr Dunkelman, and Nathan Keller. The rectangle attack -rectangling the Serpent. In Birgit Pfitzmann, editor, EUROCRYPT 2001, volume 2045 of LNCS, pages 340-357. Springer, Heidelberg, May 2001.
[b5]

via grobid
Eli Biham, Orr Dunkelman, and Nathan Keller. New results on boomerang and rectangle attacks. In Joan Daemen and Vincent Rijmen, editors, FSE 2002, volume 2365 of LNCS, pages 1-16. Springer, Heidelberg, February 2002.
[b6]

via grobid
Eli Biham and Adi Shamir. Differential cryptanalysis of DES-like cryptosystems. In Alfred J. Menezes and Scott A. Vanstone, editors, CRYPTO'90, volume 537 of LNCS, pages 2-21. Springer, Heidelberg, August 1991.
[b7]

via grobid
Alex Biryukov, Christophe De Cannière, and Gustaf Dellkrantz. Cryptanalysis of SAFER++. In Dan Boneh, editor, CRYPTO 2003, volume 2729 of LNCS, pages 195-211. Springer, Heidelberg, August 2003.
[b8]

via grobid
Alex Biryukov and Dmitry Khovratovich. Related-key cryptanalysis of the full AES- 192 and AES-256. In Mitsuru Matsui, editor, ASIACRYPT 2009, volume 5912 of LNCS, pages 1-18. Springer, Heidelberg, December 2009.
[b9]

via grobid
Carl Bracken, Chik How Tan, and Yin Tan. Binomial differentially 4 uniform permutations with high nonlinearity. Finite Fields and Their Applications, 18(3), pages 537-546, 2012.
[b10]

via grobid
Lilya Budaghyan. Construction and analysis of cryptographic functions. New York, NY, USA: Springer-Verlag, 2014.
[b11]

via grobid
Claude Carlet. Boolean Functions for Cryptography and Error Correcting Codes, Chapter of the monography Boolean Models and Methods in Mathematics, Com- puter Science, and Engineering, In Crama, Y., Hammer, P., (eds), pp. 257-397. Cambridge University Press, 2010.
[b12]

via grobid
Claude Carlet. Vectorial Boolean Functions for Cryptography, Chapter of the monography Boolean Models and Methods in Mathematics, Computer Science, and Engineering, Crama, Y., Hammer, P., (eds), pp. 398-469, Cambridge Univer- sity Press, 2010.
[b13]

via grobid
Claude Carlet, Pascale Charpin, and Victor Zinoviev. Codes, Bent Functions and Permutations Suitable For DES-like Cryptosystems. Des. Codes Cryptography, 15(2), pages 125-156, 1998.
[b14]

via grobid
Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, and Ling Song. Boomerang connectivity table: A new cryptanalysis tool. In Jesper Buus Nielsen and Vincent Ri- jmen, editors, Advances in Cryptology -EUROCRYPT 2018, pages 683-714, Cham, 2018. Springer International Publishing.
[b15]

via grobid
Hans Dobbertin. One-to-one highly nonlinear power functions on GF (2 n ). Appl. Algebra Engrg. Comm. Comput, 9, 139-152, 1998.
[b16]

via grobid
Orr Dunkelman, Nathan Keller, and Adi Shamir. A practical-time related-key at- tack on the KASUMI cryptosystem used in GSM and 3G telephony. In Tal Rabin, editor, CRYPTO 2010, volume 6223 of LNCS, pages 393-410. Springer, -Heidelberg, August 2010.
[b17]

via grobid
Robert Gold. Maximal recursive sequences with 3-valued recursive cross-correlation functions. IEEE Trans. Inform. Theory, 14(1):154-156, 1968.
[b18]

via grobid
Tadao Kasami. The weight enumerators for several classes of subcodes of the second order binary Reed-Muller codes. Information and Control, 18, pp. 369-394, 1971.
[b19]

via grobid
John Kelsey, Tadayoshi Kohno, and Bruce Schneier. Amplified boomerang attacks against reduced-round MARS and Serpent. In Bruce Schneier, editor, FSE 2000, 21. Jongsung Kim, Seokhie Hong, Bart Preneel, Eli Biham, Orr Dunkelman, and Nathan Keller. Related-Key Boomerang and Rectangle Attacks: Theory and Ex- perimental Analysis. IEEE Trans. Information Theory, 58(7):4948-4966, 2012.
[b20]

via grobid
Kaisa Nyberg. S-boxes and round functions with controllable linearity and dif- ferential uniformity. In Bart Preneel, editor, FSE'94, volume 1008 of LNCS, pages 111-130. Springer, Heidelberg, December 1995.
[b21]

via fuzzy
New Results about the Boomerang Uniformity of Permutation Polynomials
Kangquan Li, Longjiang Qu, Bing Sun, Chao Li
2019   IEEE Transactions on Information Theory
doi:10.1109/tit.2019.2918531 
[b22]

via grobid
Kaisa Nyberg. Differentially uniform mappings for cryptography. In Tor Helle- seth, editor, Advances in Cryptology -EUROCRYPT '93, pages 55-64, Berlin, Heidelberg, 1994. Springer Berlin Heidelberg.
[b23]

via grobid
Ling Song, Xianrui Qi, and Lei Hu. Boomerang Connectivity Table Revisited- Application to SKINNY and AES https://eprint.iacr.org/2019/146.pdf
[b24]

via grobid
Michael E. Zieve. Permutation polynomials induced from permutations of subfields, and some complete sets of mutually orthogonal latin squares, arXiv: 1312.1325v3, 2013.
[b25]

via grobid
David Wagner. The boomerang attack. In Lars R. Knudsen, editor, FSE'99, volume 1636 of LNCS, pages 156-170. Springer, Heidelberg, March 1999.