On the boomerang uniformity of (quadratic) permutations over F_2^n release_ubxro22o5jhj5eekmoym7pxyli

by Sihem Mesnager, Chunming Tang, Maosheng Xiong


NOTE: currently batch computed and may include additional references sources, or be missing recent changes, compared to entity reference list.
Fuzzy reference matching is a work in progress!
Read more about quality, completeness, and caveats in the fatcat guide.
Showing 1 - 26 of 26 references (in 422ms)

via grobid
Thomas Beth and Cunsheng Ding. On almost perfect nonlinear permutations. In Tor Helleseth, editor, Advances in Cryptology -EUROCRYPT '93, pages 65-76, Berlin, Heidelberg, 1994. Springer Berlin Heidelberg.

via grobid
Carl Bracken and Gregor Leander. A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree. Finite Fields Appl., 16 , pp. 231-242, 2010.

via grobid
Celine Blondeau, Anne Canteaut, Pascale Charpin. Differential properties of power functions. Int. J. Inf. Coding Theory, 1 (2) (2010) 149-170.

via fuzzy
On the Boomerang Uniformity of Cryptographic Sboxes
Christina Boura, Anne Canteaut
2018   IACR Transactions on Symmetric Cryptology
web.archive.org [PDF]

via grobid
Eli Biham, Orr Dunkelman, and Nathan Keller. The rectangle attack -rectangling the Serpent. In Birgit Pfitzmann, editor, EUROCRYPT 2001, volume 2045 of LNCS, pages 340-357. Springer, Heidelberg, May 2001.

via grobid
Eli Biham, Orr Dunkelman, and Nathan Keller. New results on boomerang and rectangle attacks. In Joan Daemen and Vincent Rijmen, editors, FSE 2002, volume 2365 of LNCS, pages 1-16. Springer, Heidelberg, February 2002.

via grobid
Eli Biham and Adi Shamir. Differential cryptanalysis of DES-like cryptosystems. In Alfred J. Menezes and Scott A. Vanstone, editors, CRYPTO'90, volume 537 of LNCS, pages 2-21. Springer, Heidelberg, August 1991.

via grobid
Alex Biryukov, Christophe De Cannière, and Gustaf Dellkrantz. Cryptanalysis of SAFER++. In Dan Boneh, editor, CRYPTO 2003, volume 2729 of LNCS, pages 195-211. Springer, Heidelberg, August 2003.

via grobid
Alex Biryukov and Dmitry Khovratovich. Related-key cryptanalysis of the full AES- 192 and AES-256. In Mitsuru Matsui, editor, ASIACRYPT 2009, volume 5912 of LNCS, pages 1-18. Springer, Heidelberg, December 2009.

via grobid
Carl Bracken, Chik How Tan, and Yin Tan. Binomial differentially 4 uniform permutations with high nonlinearity. Finite Fields and Their Applications, 18(3), pages 537-546, 2012.

via grobid
Lilya Budaghyan. Construction and analysis of cryptographic functions. New York, NY, USA: Springer-Verlag, 2014.

via grobid
Claude Carlet. Boolean Functions for Cryptography and Error Correcting Codes, Chapter of the monography Boolean Models and Methods in Mathematics, Com- puter Science, and Engineering, In Crama, Y., Hammer, P., (eds), pp. 257-397. Cambridge University Press, 2010.

via grobid
Claude Carlet. Vectorial Boolean Functions for Cryptography, Chapter of the monography Boolean Models and Methods in Mathematics, Computer Science, and Engineering, Crama, Y., Hammer, P., (eds), pp. 398-469, Cambridge Univer- sity Press, 2010.

via grobid
Claude Carlet, Pascale Charpin, and Victor Zinoviev. Codes, Bent Functions and Permutations Suitable For DES-like Cryptosystems. Des. Codes Cryptography, 15(2), pages 125-156, 1998.

via grobid
Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, and Ling Song. Boomerang connectivity table: A new cryptanalysis tool. In Jesper Buus Nielsen and Vincent Ri- jmen, editors, Advances in Cryptology -EUROCRYPT 2018, pages 683-714, Cham, 2018. Springer International Publishing.

via grobid
Hans Dobbertin. One-to-one highly nonlinear power functions on GF (2 n ). Appl. Algebra Engrg. Comm. Comput, 9, 139-152, 1998.

via grobid
Orr Dunkelman, Nathan Keller, and Adi Shamir. A practical-time related-key at- tack on the KASUMI cryptosystem used in GSM and 3G telephony. In Tal Rabin, editor, CRYPTO 2010, volume 6223 of LNCS, pages 393-410. Springer, -Heidelberg, August 2010.

via grobid
Robert Gold. Maximal recursive sequences with 3-valued recursive cross-correlation functions. IEEE Trans. Inform. Theory, 14(1):154-156, 1968.

via grobid
Tadao Kasami. The weight enumerators for several classes of subcodes of the second order binary Reed-Muller codes. Information and Control, 18, pp. 369-394, 1971.

via grobid
John Kelsey, Tadayoshi Kohno, and Bruce Schneier. Amplified boomerang attacks against reduced-round MARS and Serpent. In Bruce Schneier, editor, FSE 2000, 21. Jongsung Kim, Seokhie Hong, Bart Preneel, Eli Biham, Orr Dunkelman, and Nathan Keller. Related-Key Boomerang and Rectangle Attacks: Theory and Ex- perimental Analysis. IEEE Trans. Information Theory, 58(7):4948-4966, 2012.

via grobid
Kaisa Nyberg. S-boxes and round functions with controllable linearity and dif- ferential uniformity. In Bart Preneel, editor, FSE'94, volume 1008 of LNCS, pages 111-130. Springer, Heidelberg, December 1995.

via fuzzy
New Results about the Boomerang Uniformity of Permutation Polynomials
Kangquan Li, Longjiang Qu, Bing Sun, Chao Li
2019   IEEE Transactions on Information Theory

via grobid
Kaisa Nyberg. Differentially uniform mappings for cryptography. In Tor Helle- seth, editor, Advances in Cryptology -EUROCRYPT '93, pages 55-64, Berlin, Heidelberg, 1994. Springer Berlin Heidelberg.

via grobid
Ling Song, Xianrui Qi, and Lei Hu. Boomerang Connectivity Table Revisited- Application to SKINNY and AES https://eprint.iacr.org/2019/146.pdf

via grobid
Michael E. Zieve. Permutation polynomials induced from permutations of subfields, and some complete sets of mutually orthogonal latin squares, arXiv: 1312.1325v3, 2013.

via grobid
David Wagner. The boomerang attack. In Lars R. Knudsen, editor, FSE'99, volume 1636 of LNCS, pages 156-170. Springer, Heidelberg, March 1999.