Public quadratic polynomial-tuples for efficient signature-verification and message-encryption
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Provable Security Against Differential Cryptanalysis
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
On the construction of highly nonlinear permutations
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
Systematic generation of cryptographically robust S-boxes
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
On almost perfect nonlinear permutations
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
The design of substitution-permutation networks resistant to differential and linear cryptanalysis
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Designs, Codes and Cryptography - Special issue dedicated to Gustavus J. Simmons
Codes, Bent Functions and Permutations Suitable For DES-likeCryptosystems
Designs, Codes and Cryptography
Maximally Nonlinear Functions and Bent Functions
Designs, Codes and Cryptography - Special issue on designs and codes—a memorial tribute to Ed Assmus
Relating Differential Distribution Tables to Other Propertiesof of Substitution Boxes
Designs, Codes and Cryptography
Linear Frameworks for Block Ciphers
Designs, Codes and Cryptography
Upper and Lower Bounds on Maximum Nonlinearity ofn-input m-output Boolean Function
Designs, Codes and Cryptography
Toward Provable Security of Substitution-Permutation Encryption Networks
SAC '98 Proceedings of the Selected Areas in Cryptography
Efficient Evaluation of Security against Generalized Interpolation Attack
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
Controlled Operations as a Cryptographic Primitive
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Pitfalls in Designing Substitution Boxes (Extended Abstract)
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Cryptographic Functions and Design Criteria for Block Ciphers
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Improved Construction of Nonlinear Resilient S-Boxes
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
A New Characterization of Almost Bent Functions
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Provable Security against Differential and Linear Cryptanalysis for the SPN Structure
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
Codes, graphs, and schemes from nonlinear functions
European Journal of Combinatorics
Cartesian authentication codes from functions with optimal nonlinearity
Theoretical Computer Science
Algorithms for Information Conversion Based on Controlled Two-Place Operations
Cybernetics and Systems Analysis
Journal of Complexity - Special issue on coding and cryptography
On the Non-linearity of Power Functions
Designs, Codes and Cryptography
Affine equivalence in the AES round function
Discrete Applied Mathematics
Multi-objective optimisation of bijective S-boxes
New Generation Computing - Evolutionary computation
The design of composite permutations with applications to DES-like S-boxes
Designs, Codes and Cryptography
The only crooked power functions are x2k+2l
European Journal of Combinatorics
Projective aspects of the AES inversion
Designs, Codes and Cryptography
Adaptive loops with kaapi on multicore and grid: applications in symmetric cryptography
Proceedings of the 2007 international workshop on Parallel symbolic computation
On the design of error-correcting ciphers
EURASIP Journal on Wireless Communications and Networking
Designs, Codes and Cryptography
Rotation symmetry in algebraically generated cryptographic substitution tables
Information Processing Letters
On the classification of APN functions up to dimension five
Designs, Codes and Cryptography
On the Classification of 4 Bit S-Boxes
WAIFI '07 Proceedings of the 1st international workshop on Arithmetic of Finite Fields
The Simplest Method for Constructing APN Polynomials EA-Inequivalent to Power Functions
WAIFI '07 Proceedings of the 1st international workshop on Arithmetic of Finite Fields
Side Channel Cryptanalysis of a Higher Order Masking Scheme
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
WAIFI '08 Proceedings of the 2nd international workshop on Arithmetic of Finite Fields
EA and CCZ Equivalence of Functions over GF(2n)
WAIFI '08 Proceedings of the 2nd international workshop on Arithmetic of Finite Fields
On Cryptographically Significant Mappings over GF(2n)
WAIFI '08 Proceedings of the 2nd international workshop on Arithmetic of Finite Fields
On 3-to-1 and Power APN S-Boxes
SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications
New Perfect Nonlinear Multinomials over F$_{p^{2k}}$ for Any Odd Prime p
SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications
New Applications of Differential Bounds of the SDS Structure
ISC '08 Proceedings of the 11th international conference on Information Security
A Criterion for Attaining the Welch Bounds with Applications for Mutually Unbiased Bases
Mathematical Methods in Computer Science
Improved MACs from Differentially-Uniform Permutations
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Designs, Codes and Cryptography
MAC Precomputation with Applications to Secure Memory
ISC '09 Proceedings of the 12th International Conference on Information Security
Algebraic immunity of S-boxes based on power mappings: analysis and construction
IEEE Transactions on Information Theory
Affine equivalence in the AES round function
Discrete Applied Mathematics
New semifields, PN and APN functions
Designs, Codes and Cryptography
Differential properties of power functions
International Journal of Information and Coding Theory
Non-linear approximations in linear cryptanalysis
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Convergence in differential distributions
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
On nonlinear resilient functions
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Resistance against general iterated attacks
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
S-boxes with controllable nonlinearity
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Propagation characteristics and correlation-immunity of highly nonlinear boolean functions
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Improved security analysis of XEX and LRW modes
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Differentially 2-uniform cocycles: the binary case
AAECC'03 Proceedings of the 15th international conference on Applied algebra, algebraic algorithms and error-correcting codes
An analysis of the Hermes8 stream ciphers
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
ICISS'07 Proceedings of the 3rd international conference on Information systems security
Determining the nonlinearity of a new family of APN functions
AAECC'07 Proceedings of the 17th international conference on Applied algebra, algebraic algorithms and error-correcting codes
On the Walsh spectrum of a new APN function
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
Whirlwind: a new cryptographic hash function
Designs, Codes and Cryptography
On quadratic APN functions and dimensional dual hyperovals
Designs, Codes and Cryptography
How to teach undergraduate students a real cipher design
ITHET'10 Proceedings of the 9th international conference on Information technology based higher education and training
On the nonlinearity of discrete logarithm in F2n
SETA'10 Proceedings of the 6th international conference on Sequences and their applications
A few more quadratic APN functions
Cryptography and Communications
New commutative semifields defined by new PN multinomials
Cryptography and Communications
On EA-equivalence of certain permutations to power mappings
Designs, Codes and Cryptography
On unbalanced Feistel networks with contracting MDS diffusion
Designs, Codes and Cryptography
Designs, Codes and Cryptography
Permutation polynomials EA-equivalent to the inverse function over GF (2n)
Cryptography and Communications
Differential fault analysis of the advanced encryption standard using a single fault
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes
FSE'11 Proceedings of the 18th international conference on Fast software encryption
On known and new differentially uniform functions
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
An efficient, parameterized and scalable S-box for stream ciphers
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
On the equivalence of quadratic APN functions
Designs, Codes and Cryptography
Functions of degree 4e that are not APN infinitely often
Cryptography and Communications
A complete formulation of generalized affine equivalence
ICTCS'05 Proceedings of the 9th Italian conference on Theoretical Computer Science
On highly nonlinear s-boxes and their inability to thwart DPA attacks
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
A new criterion for nonlinearity of block ciphers
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
Block ciphers sensitive to gröbner basis attacks
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
Pseudorandom permutation families over abelian groups
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
Provably secure MACs from differentially-uniform permutations and AES-Based implementations
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
Ambiguity and deficiency in costas arrays and APN permutations
LATIN'10 Proceedings of the 9th Latin American conference on Theoretical Informatics
General principles of algebraic attacks and new design criteria for cipher components
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
The inverse s-box, non-linear polynomial relations and cryptanalysis of block ciphers
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
Understanding two-round differentials in AES
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
High diffusion cipher: encryption and error correction in a single cryptographic primitive
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
On the (im)possibility of practical and secure nonlinear filters and combiners
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Equivalence classes of functions between finite groups
Journal of Algebraic Combinatorics: An International Journal
Results on rotation-symmetric S-boxes
Information Sciences: an International Journal
Reversed Dickson polynomials over finite fields
Finite Fields and Their Applications
On systems of linear and diagonal equation of degree p i+1 over finite fields of characteristic p
Finite Fields and Their Applications
New families of quadratic almost perfect nonlinear trinomials and multinomials
Finite Fields and Their Applications
APN monomials over GF(2n ) for infinitely many n
Finite Fields and Their Applications
Propagation characteristics of x→ x-1 and Kloosterman sums
Finite Fields and Their Applications
Finite Fields and Their Applications
Perfect nonlinear binomials and their semifields
Finite Fields and Their Applications
Constructing new APN functions from known ones
Finite Fields and Their Applications
The affinity of a permutation of a finite vector space
Finite Fields and Their Applications
Finite Fields and Their Applications
A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree
Finite Fields and Their Applications
Construction of highly nonlinear resilient S-boxes with given degree
Designs, Codes and Cryptography
PICARO: a block cipher allowing efficient higher-order side-channel resistance
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Sequences and functions derived from projective planes and their difference sets
WAIFI'12 Proceedings of the 4th international conference on Arithmetic of Finite Fields
Verification of restricted EA-equivalence for vectorial boolean functions
WAIFI'12 Proceedings of the 4th international conference on Arithmetic of Finite Fields
Differential properties of elliptic curves and blind signatures
ISC'07 Proceedings of the 10th international conference on Information Security
A new method to determine algebraic expression of power mapping based S-boxes
Information Processing Letters
ERCA: efficient and robust cipher algorithm for LTE data confidentiality
Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems
Note: Permutation polynomials and their differential properties over residue class rings
Discrete Applied Mathematics
On the relationships between perfect nonlinear functions and universal hash families
Theoretical Computer Science
Differential entropy analysis of the IDEA block cipher
Journal of Computational and Applied Mathematics
The Carlitz rank of permutations of finite fields: A survey
Journal of Symbolic Computation
A recursive construction of highly nonlinear resilient vectorial functions
Information Sciences: an International Journal
Hi-index | 0.06 |
This work is motivated by the observation that in DES-like ciphers it is possible to choose the round functions in such a way that every non-trivial one-round characteristic has small probability. This gives rise to the following definition. A mapping is called differentially uniform if for every non-zero input difference and any output difference the number of possible inputs has a uniform upper bound. The examples of differentially uniform mappings provided in this paper have also other desirable cryptographic properties: large distance from affine functions, high nonlinear order and efficient computability.