@article{MVK_2019_10_1_a3,
author = {F. M. Malyshev},
title = {Probabilistic characteristics of differential and linear relations for nonhomogeneous linear medium},
journal = {Matemati\v{c}eskie voprosy kriptografii},
pages = {41--72},
year = {2019},
volume = {10},
number = {1},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/MVK_2019_10_1_a3/}
}
TY - JOUR AU - F. M. Malyshev TI - Probabilistic characteristics of differential and linear relations for nonhomogeneous linear medium JO - Matematičeskie voprosy kriptografii PY - 2019 SP - 41 EP - 72 VL - 10 IS - 1 UR - http://geodesic.mathdoc.fr/item/MVK_2019_10_1_a3/ LA - ru ID - MVK_2019_10_1_a3 ER -
F. M. Malyshev. Probabilistic characteristics of differential and linear relations for nonhomogeneous linear medium. Matematičeskie voprosy kriptografii, Tome 10 (2019) no. 1, pp. 41-72. http://geodesic.mathdoc.fr/item/MVK_2019_10_1_a3/
[1] Yang G., Zhu B., Suder V., Aagaard M. D., Gong G., “The Simeck family of lightweight block ciphers”, CHES, Lect. Notes Comput. Sci., 9293, 2015, 307–329 | DOI | Zbl
[2] Shors D., Smith J., Treatman-Clark S., Weeks B., Wingers L., The Simon and Speck families of lightweight block ciphers, IACR Cryptology ePrint Archive, 2013/404, 2013
[3] Bernstein D., Salsa20/8 and Salsa20/12, , 2006 http://cr.yp.to/snuffle/812.pdf
[4] Shimizu A., Miyaguchi S., “Fast data encripherment algorithm FEAL”, Lect. Notes Comput. Sci., 304, 1988, 267–278 | DOI
[5] Ferguson N., Lucks S., Schneier B., Whiting D., Bellare M., Kohno T., Callas J., Walker J., The Skein hash family, 2010 | DOI
[6] Leurent G., “Construction of differential charecteristics in ARX designs application to Skein”, CRYPTO 2013, Lect. Notes Comput. Sci., 8042, 2013, 241–258 | DOI | Zbl
[7] Biryukov A., Velichkov V., “Automatic search for differential trails in ARX ciphers”, Lect. Notes Comput. Sci., 8366, 2014, 227–250 | DOI | MR | Zbl
[8] Biryukov A., Roy A., Velichkov V., “Differential analysis of block ciphers Simon and Speck”, Lect. Notes Comput. Sci., 8540, 2014, 525–545
[9] Blondeau C., “Improbable differential from impossible differential: on the validity of the model”, Lect. Notes Comput. Sci., 8250, 2013, 149–160 | DOI | Zbl
[10] Tezcan C., “The improbable differential attack: cryptanalysis of reduced round CLEFIA”, Lect. Notes Comput. Sci., 6498, 2010, 197–209 | DOI | Zbl
[11] Tolba M., Abdelkhalek A., Youssef M., Impossible differential cryptanalysis of redused-round SKINNY, Cryptology ePrint Archive, 2016/1115, 2016
[12] Blondeau C., Peyrin T., Wang L., “Known-key distinguisher on full PRESENT”, Lect. Notes. Comput. Sci., 9215, 2015, 455–474 | DOI | MR | Zbl
[13] Knudsen L. R., Wagner D., “Integral cryptanalysis”, FSE 2002, Lect. Notes Comput. Sci., 2365, 2002, 112–127 | DOI | Zbl
[14] Malyshev F. M., “Dvoistvennost raznostnogo i lineinogo metodov v kriptografii”, Matematicheskie voprosy kriptografii, 5:3 (2014), 35–47 | DOI
[15] Malyshev F. M., Trifonov D. I., “Rasseivayuschie svoistva XSLP-shifrov”, Matematicheskie voprosy kriptografii, 7:3 (2016), 47–60 | DOI
[16] Malyshev F. M., Trishin A. E., “Lineinyi i raznostnyi metody v kriptografii (drugoi vzglyad)”, Algebra, teoriya chisel i diskretnaya geometriya: Sovremennye problemy i prilozheniya, Mater. XV Mezhdunar. konf., posvyaschennoi stoletiyu so dnya rozhdeniya professora N. M. Korobova (Tula), TGPU im. L.N. Tolstogo, Tula, 2018, 42–45
[17] Yablonskii S. V., Vvedenie v diskretnuyu matematiku, Nauka, M., 1979, 272 pp.
[18] Wallen J., On the differential and linear properties of addition, HUT-TCS-A84, Helsinki Univ. of Technology, Lab. Theor. Comput. Sci., Espoo, 2003