Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Algebra and Number Theory
Reference34 articles.
1. E. Biham, O. Dunkelman, N. Keller, New results on boomerang and rectangle attacks, In: Daemen J., Rijmen V. (eds.), Fast Software Encryption, FSE 2002, LNCS 2365, 2002, pp. 1–16, Springer, Berlin, Heidelberg
2. A. Biryukov, D. Khovratovich, Related-key cryptanalysis of the full AES-$$192$$ and AES-$$256$$, In: Matsui M. (ed.), Adv. in Crypt. – ASIACRYPT 2009, LNCS 5912, 2009, pp. 1–18, Springer, Berlin, Heidelberg
3. Boura, C., Canteaut,IE A.: On the boomerang uniformity of cryptographic Sboxes. IACR Trans. Symmetric Cryptol. 3, 290–310 (2018)
4. C. Boura, L. Perrin, S. Tian, Boomerang Uniformity of Popular S-box Constructions, Workshop on Cryptography and Coding 2019, Paper 15, https://www.lebesgue.fr/sites/default/files/proceedings/_20WCC/WCC/_2019/_20paper/_15.pdf
5. Budaghyan, L.: Construction and analysis of cryptographic functions. Springer-Verlag (2014)
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献