Observability of permutations, and stream ciphers (original) (raw)

Exponential Brute-Force Complexity of A Permutation Based Stream Cipher

Hamdy Soliman

International Journal of Computer Network and Information Security, 2013

View PDFchevron_right

Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations

John Steinberger

Advances in Cryptology – EUROCRYPT 2012, 2012

View PDFchevron_right

Permutation Operations in Block Ciphers

Ruby Lee

2004

View PDFchevron_right

Communication Complexity of Permutation-Invariant Functions

Pritish Kamath

Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, 2015

View PDFchevron_right

Notions and relations for RKA-secure permutation and function families

Jaechul Sung

Designs, Codes, and Cryptography, 2010

View PDFchevron_right

Statistics of Random Permutations and the Cryptanalysis of Periodic Block Ciphers

Shaun V Ault, Nicolas Courtois

Cryptologia, 2012

View PDFchevron_right

Cryptanalysis of Stream Ciphers with Linear Masking

Charanjit Jutla

Lecture Notes in Computer Science, 2002

View PDFchevron_right

The Identity Transform of a Permutation and its Applications

simone rinaldi

Fundamenta Informaticae, 2015

View PDFchevron_right

Design of Self-Synchronizing Stream Ciphers: a New Control-Theoretical Paradigm

Brandon Dravie

IFAC-PapersOnLine, 2017

View PDFchevron_right

Pseudo-random permutation generators and cryptographic composition

Michael Luby

1986

View PDFchevron_right

On the Constructions of New Symmetric Ciphers Based on Nonbijective Multivariate Maps of Prescribed Degree

Aneta Wroblewska

Security and Communication Networks, 2019

View PDFchevron_right

Hidden symmetries and large N factorisation for permutation invariant matrix observables

Sanjaye Ramgoolam

Journal of High Energy Physics

View PDFchevron_right

A General Cryptanalysis of Permutation-Only Multimedia Encryption Algorithms

Shujun Li

2004

View PDFchevron_right

A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks

Shujun Li

Signal Processing-image Communication, 2008

View PDFchevron_right

08 A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks.pdf

Cary Li

View PDFchevron_right

Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks

John Steinberger

Lecture Notes in Computer Science, 2018

View PDFchevron_right

Practical and Provable Security against Differential and Linear Cryptanalysis for Substitution-Permutation Networks

이옥연 (수학과), Ju-sung Kang

ETRI Journal, 2001

View PDFchevron_right

On Permutation Operations in Cipher Design

Ruby B. Lee

View PDFchevron_right

Security proof of the canonical form of self-synchronizing stream ciphers

Brandon Dravie

Designs, Codes and Cryptography, 2016

View PDFchevron_right

On the implementation of new symmetric ciphers based on non-bijective multivariate maps

Aneta Wroblewska

Proceedings of the 2018 Federated Conference on Computer Science and Information Systems

View PDFchevron_right

A Spectral Approach to Pattern-Avoiding Permutations

Peter Perry

View PDFchevron_right

Codes, Bent Functions and Permutations Suitable for DES-like Cryptosystems

Pascale Charpin

Designs, Codes, and Cryptography, 1998

View PDFchevron_right

On the Resilience of Even-Mansour to Invariant Permutations

Samuel Machado Neves

Des. Codes Cryptogr., 2021

View PDFchevron_right

An Excellent Permutation Operator for Cryptographic Applications

Josef Scharinger

Lecture Notes in Computer Science, 2005

View PDFchevron_right

AN ANALYSIS OF THE CONSTRUCTION OF CRYPTOGRAPHIC BOOLEAN FUNCTIONS FOR STREAM CIPHERS

Mehreen Afzal

View PDFchevron_right

CryptographicPropertiesandImplementationComplexityofDifferentPermutationOperations

Ruby B. Lee

View PDFchevron_right

On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers

Souvik Ray

Designs, Codes and Cryptography, 2017

View PDFchevron_right

A note on Adrian Lewis' result on permutation invariant functions

Andrew Eberhard

View PDFchevron_right

New Distinguishers Based on Random Mappings against Stream Ciphers

Nurdan Saran

Lecture Notes in Computer Science

View PDFchevron_right