On immunity against Biham and Shamir's “differential cryptanalysis”

https://doi.org/10.1016/0020-0190(92)90258-WGet rights and content

First page preview

First page preview
Click to open first page preview

References (14)

  • O.S. Rothaus

    On “bent” functions

    J. Combin. Theory Ser. A

    (1976)
  • C.M. Adams

    A formal and practical design procedure for substitution-permutation network cryptosystems

  • C.M. Adams et al.

    Generating and counting binary bent sequences

    IEEE Trans. Inform. Theory

    (1990)
  • C.M. Adams et al.

    The structured design of cryptographically good s-boxes

    J. Cryptopology

    (1990)
  • C.M. Adams et al.

    The use of bent sequences to achieve higher-order strict avalanche criterion in s-box design

  • E. Biham and A. Shamir, Differential cryptanalysis of DES-like cryptosystems, in: Advances in Cryptology: Proc. of...
  • R. Forré

    The strict avalance criterion: Spectral properties of boolean functions and an extended definition

There are more references available in the full text version of this article.

Cited by (22)

  • Cryptanalysis of 4-Bit Crypto S-Boxes in Smart Applications

    2019, Lecture Notes in Intelligent Transportation and Infrastructure
  • Bent Functions: Results and Applications to Cryptography

    2015, Bent Functions: Results and Applications to Cryptography
View all citing articles on Scopus

This work is entirely based on the author's Ph.D. Thesis research and is unrelated to his present work at BNR.

View full text