Voir la notice de l'article provenant de la source Math-Net.Ru
@article{DA_2013_20_5_a4, author = {A. I. Pestunov}, title = {An impact of the two values difference's {Hamming} weight on its preserving probability after addition and subtraction}, journal = {Diskretnyj analiz i issledovanie operacij}, pages = {58--65}, publisher = {mathdoc}, volume = {20}, number = {5}, year = {2013}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/DA_2013_20_5_a4/} }
TY - JOUR AU - A. I. Pestunov TI - An impact of the two values difference's Hamming weight on its preserving probability after addition and subtraction JO - Diskretnyj analiz i issledovanie operacij PY - 2013 SP - 58 EP - 65 VL - 20 IS - 5 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/DA_2013_20_5_a4/ LA - ru ID - DA_2013_20_5_a4 ER -
%0 Journal Article %A A. I. Pestunov %T An impact of the two values difference's Hamming weight on its preserving probability after addition and subtraction %J Diskretnyj analiz i issledovanie operacij %D 2013 %P 58-65 %V 20 %N 5 %I mathdoc %U http://geodesic.mathdoc.fr/item/DA_2013_20_5_a4/ %G ru %F DA_2013_20_5_a4
A. I. Pestunov. An impact of the two values difference's Hamming weight on its preserving probability after addition and subtraction. Diskretnyj analiz i issledovanie operacij, Tome 20 (2013) no. 5, pp. 58-65. http://geodesic.mathdoc.fr/item/DA_2013_20_5_a4/
[1] Agibalov G. P., “Elementy teorii differentsialnogo kriptoanaliza iterativnykh blochnykh shifrov s additivnym raundovym klyuchom”, Prikl. diskret. matematika, 2008, no. 1, 34–42
[2] Pestunov A. I., “Blochnye shifry i ikh kriptoanaliz”, Vychisl. tekhnologii, 12, spets. vyp. No 4 (2007), 42–49 | Zbl
[3] Pestunov A. I., “Differentsialnyi kriptoanaliz blochnogo shifra CAST-256”, Bezopasnost inform. tekhnologii, 2009, no. 4, 57–62
[4] Pestunov A. I., “Differentsialnyi kriptoanaliz blochnogo shifra MARS”, Prikl. diskret. matematika, 2009, no. 4, 56–63
[5] Pestunov A. I., “O veroyatnosti protyazhki odnobitovoi raznosti cherez slozhenie i vychitanie po modulyu”, Prikl. diskret. matematika, 2012, no. 4, 53–60
[6] Biham E., Biryukov A., Shamir A., “Cryptanalysis of Skipjack reduced to 31 round using impossible differentials”, Proc. Eurocrypt–99, Lect. Notes Comp. Sci., 1592, Springer-Verl., Berlin, 1999, 12–23 | DOI | Zbl
[7] Biham E., Shamir A., “Differential cryptanalysis of DES-like cryptosystem”, J. Cryptology, 4 (1991), 3–72 | DOI | MR | Zbl
[8] Biryukov A., Kushilevitz E., “Improved cryptanalysis of RC5”, Proc. Eurocrypt–98, Lect. Notes Comp. Sci., 1403, Springer-Verl., Berlin, 1998, 85–99 | DOI | Zbl
[9] Kelsey J., Kohno T., Schneier B., “Amplified boomerang attacks against reduced-round MARS and Serpent”, Proc. FSE–00, Lect. Notes Comp. Sci., 1978, Springer-Verl., Berlin, 2001, 75–93 | DOI | Zbl
[10] Lai X., Massey J., “Markov ciphers and differential cryptanalysis”, Proc. Eurocrypt–91, Lect. Notes Comp. Sci., 547, Springer-Verl., Berlin, 1991, 17–38 | DOI | MR
[11] Nyberg K., Knudsen L., “Provable security against a differential attack”, J. Cryptology, 8 (1995), 27–37 | DOI | MR | Zbl
[12] Vaudenay S., “Decorrelation: a theory for block cipher security”, J. Cryptology, 16 (2003), 249–286 | DOI | MR | Zbl
[13] Wagner D., “The boomerang attack”, Proc. FSE–99, Lect. Notes Comp. Sci., 1636, Springer-Verl., Berlin, 1999, 156–170 | DOI | Zbl