Observability of permutations, and stream ciphers (original) (raw)
Related papers
Exponential Brute-Force Complexity of A Permutation Based Stream Cipher
International Journal of Computer Network and Information Security, 2013
Advances in Cryptology – EUROCRYPT 2012, 2012
Permutation Operations in Block Ciphers
2004
Communication Complexity of Permutation-Invariant Functions
Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, 2015
Notions and relations for RKA-secure permutation and function families
Designs, Codes, and Cryptography, 2010
Statistics of Random Permutations and the Cryptanalysis of Periodic Block Ciphers
Shaun V Ault, Nicolas Courtois
Cryptologia, 2012
Cryptanalysis of Stream Ciphers with Linear Masking
Lecture Notes in Computer Science, 2002
The Identity Transform of a Permutation and its Applications
Fundamenta Informaticae, 2015
Design of Self-Synchronizing Stream Ciphers: a New Control-Theoretical Paradigm
IFAC-PapersOnLine, 2017
Pseudo-random permutation generators and cryptographic composition
1986
Security and Communication Networks, 2019
Hidden symmetries and large N factorisation for permutation invariant matrix observables
Journal of High Energy Physics
A General Cryptanalysis of Permutation-Only Multimedia Encryption Algorithms
2004
Signal Processing-image Communication, 2008
Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks
Lecture Notes in Computer Science, 2018
ETRI Journal, 2001
On Permutation Operations in Cipher Design
Security proof of the canonical form of self-synchronizing stream ciphers
Designs, Codes and Cryptography, 2016
On the implementation of new symmetric ciphers based on non-bijective multivariate maps
Proceedings of the 2018 Federated Conference on Computer Science and Information Systems
A Spectral Approach to Pattern-Avoiding Permutations
Codes, Bent Functions and Permutations Suitable for DES-like Cryptosystems
Designs, Codes, and Cryptography, 1998
On the Resilience of Even-Mansour to Invariant Permutations
Des. Codes Cryptogr., 2021
An Excellent Permutation Operator for Cryptographic Applications
Lecture Notes in Computer Science, 2005
AN ANALYSIS OF THE CONSTRUCTION OF CRYPTOGRAPHIC BOOLEAN FUNCTIONS FOR STREAM CIPHERS
CryptographicPropertiesandImplementationComplexityofDifferentPermutationOperations
On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers
Designs, Codes and Cryptography, 2017
A note on Adrian Lewis' result on permutation invariant functions
New Distinguishers Based on Random Mappings against Stream Ciphers
Lecture Notes in Computer Science