Mots-clés : inversion
@article{PDMA_2022_15_a0,
author = {N. A. Kolomeets and D. A. Bykov},
title = {Invariant subspaces of functions affine equivalent to the finite field inversion},
journal = {Prikladnaya Diskretnaya Matematika. Supplement},
pages = {5--8},
year = {2022},
number = {15},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/PDMA_2022_15_a0/}
}
TY - JOUR AU - N. A. Kolomeets AU - D. A. Bykov TI - Invariant subspaces of functions affine equivalent to the finite field inversion JO - Prikladnaya Diskretnaya Matematika. Supplement PY - 2022 SP - 5 EP - 8 IS - 15 UR - http://geodesic.mathdoc.fr/item/PDMA_2022_15_a0/ LA - ru ID - PDMA_2022_15_a0 ER -
N. A. Kolomeets; D. A. Bykov. Invariant subspaces of functions affine equivalent to the finite field inversion. Prikladnaya Diskretnaya Matematika. Supplement, no. 15 (2022), pp. 5-8. http://geodesic.mathdoc.fr/item/PDMA_2022_15_a0/
[1] FIPS Publ. 197. Advanced Encryption Standard, , 2001 http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
[2] Daemen J. and Rijmen V., The Design of Rijndael: AES — the Advanced Encryption Standard, Springer Verlag, 2002 | MR | Zbl
[3] Caranti A., Volta F., and Sala M., Imprimitive permutations groups generated by the round functions of key-alternating block ciphers and truncated differential cryptanalysis, 2006, arXiv: math/0606022
[4] Caranti A., Volta F., and Sala M., “An application of the O'Nan-Scott theorem to the group generated by the round functions of an AES-like cipher”, Des. Codes Cryptogr., 52 (2009), 293–301 | DOI | MR | Zbl
[5] Caranti A., Volta F., and Sala M., “On some block ciphers and imprimitive groups”, Appl. Algebra Eng. Commun. Comput., 20 (2009), 339–350 | DOI | MR | Zbl
[6] Leander G., Abdelraheem M. A., AlKhzaimi H., and Zenner E., “A cryptanalysis of PRINTcipher: The invariant subspace attack”, LNCS, 6841, 2011, 206–221 | MR | Zbl
[7] Trifonov D. I., Fomin D. B., “Ob invariantnykh podprostranstvakh v XSL-shifrakh”, Prikladnaya diskretnaya matematika, 2021, no. 54, 58–76 | Zbl
[8] Todo Y., Leander G., and Sasaki Y., “Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64”, ASIACRYPT 2016, LNCS, 10032, 2016, 3–33 | MR | Zbl
[9] Burov D. A., “O suschestvovanii nelineinykh invariantov spetsialnogo vida dlya raundovykh preobrazovanii XSL-algoritmov”, Diskretnaya matematika, 33:2 (2021), 31–45 | MR
[10] Mattarei S., “Inverse-closed additive subgroups of fields”, Israel J. Math., 159 (2007), 343–347 | DOI | MR | Zbl
[11] Goldstein D., Guralnick R., Small L., and Zelmanov E., “Inversion-invariant additive subgroups of division rings”, Pacific J. Math., 227 (2006), 287–294 | DOI | MR | Zbl
[12] Nyberg K., “Differentially uniform mappings for cryptography”, LNCS, 765, 1994, 55–64 | MR | Zbl
[13] Carlet S., “Open questions on nonlinearity and on APN Functions”, LNCS, 9061, 2015, 83–107 | MR | Zbl
[14] Hua L.-K., “Some properties of a sfield”, Proc. NAS USA, 35 (1949), 533–537 | DOI | MR | Zbl