On immunity against Biham and Shamir's “differential cryptanalysis”☆
References (14)
On “bent” functions
J. Combin. Theory Ser. A
(1976)A formal and practical design procedure for substitution-permutation network cryptosystems
- et al.
Generating and counting binary bent sequences
IEEE Trans. Inform. Theory
(1990) - et al.
The structured design of cryptographically good s-boxes
J. Cryptopology
(1990) - et al.
The use of bent sequences to achieve higher-order strict avalanche criterion in s-box design
- E. Biham and A. Shamir, Differential cryptanalysis of DES-like cryptosystems, in: Advances in Cryptology: Proc. of...
The strict avalance criterion: Spectral properties of boolean functions and an extended definition
There are more references available in the full text version of this article.
Cited by (22)
Design and evaluation of a block encryption algorithm using dynamic-key mechanism
2004, Future Generation Computer SystemsMore efficient software implementations of (generalized) DES
1993, Computers and SecurityA smart review and two new techniques using 4-bit Boolean functions for cryptanalysis of 4-bit crypto S-boxes
2021, International Journal of Computers and ApplicationsCryptanalysis of 4-Bit Crypto S-Boxes in Smart Applications
2019, Lecture Notes in Intelligent Transportation and InfrastructureBent Functions: Results and Applications to Cryptography
2015, Bent Functions: Results and Applications to CryptographyLiterature survey on nonlinear components and chaotic nonlinear components of block ciphers
2013, Nonlinear Dynamics
- ☆
This work is entirely based on the author's Ph.D. Thesis research and is unrelated to his present work at BNR.
Copyright © 1992 Published by Elsevier B.V.