Author:
Baignères Thomas,Junod Pascal,Vaudenay Serge
Publisher
Springer Berlin Heidelberg
Reference34 articles.
1. Lecture Notes in Computer Science;D. Coppersmith,2002
2. Wiley Series in Telecommunications;T. Cover,1991
3. Lecture Notes in Computer Science;J. Daemen,1995
4. Information Security and Cryptography;J. Daemen,2002
5. Wiley Series in Probability and Mathematical Statistics;W. Feller,1968
Cited by
93 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Approximating neural distinguishers using differential-linear imbalance;The Journal of Supercomputing;2024-09-11
2. Linear Cryptanalysis;Symmetric Cryptography 2;2023-12
3. Poster: Generic Multidimensional Linear Cryptanalysis of Feistel Ciphers;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
4. Use of cryptography in malware obfuscation;Journal of Computer Virology and Hacking Techniques;2023-09-25
5. Enhanced Differential-Linear Attacks on Reduced Round ChaCha;IEEE Transactions on Information Theory;2023-08