Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDM_2022_3_a3, author = {D. I. Trifonov}, title = {Flaws of hypercube-like ciphers}, journal = {Prikladna\^a diskretna\^a matematika}, pages = {52--66}, publisher = {mathdoc}, number = {3}, year = {2022}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDM_2022_3_a3/} }
D. I. Trifonov. Flaws of hypercube-like ciphers. Prikladnaâ diskretnaâ matematika, no. 3 (2022), pp. 52-66. http://geodesic.mathdoc.fr/item/PDM_2022_3_a3/
[1] Trifonov D. I. and Fomin D. B., “Invariant subspaces in SPN block c ipher”, Prikladnaya Diskretnaya Matematika, 2021, no. 54, 59–77 (in Russian)
[2] GOST R 34.12-2015. Information Technology. Cryptographic Information Protection. Block ciphers, Standartinform, M., 2015 (in Russian)
[3] Burov D. A. and Pogorelov B. A., “An attack on 6 rounds of KHAZAD.”, Matem. Vopr. Kriptogr., 7:2 (2016), 35–46 | MR | Zbl
[4] Gluhov M. M., Elizarov V. P., and Nechaev A. A., Algebra, v. 1, Gelios ARV Publ., M., 2003, 336 pp. (in Russian)
[5] Gluhov M. M., Elizarov V. P., and Nechaev A. A., Algebra, v. 2, Gelios ARV Publ., M., 2003, 416 pp. (in Russian)
[6] Malyshev F. M. and Tarakanov V. E., “Generalized de Bruijn graphs”, Matem. Zametki, 62:4 (1997), 540–548 (in Russian) | Zbl
[7] Daemon J. and Rijmen V., The Design of Rijndael: AES — The Advanced Encryption Standard, Springer, Berlin–Heidelberg, 2002, 238 pp. | MR
[8] Erokhin A. V., Malyshev F. M., and Trishin A. E., “Multidimensional linear method and diffusion characteristics of linear medium of ciphering transform”, Matem. Vopr. Kriptogr., 8:4 (2017), 29–62 (in Russian) | MR | Zbl
[9] Advanced Encryption Standard (AES), 2001 https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.197.pdf
[10] GOST R 34.11-2012. Information Technology. Cryptographic Information Protection. Hash Function, Standartinform, M., 2012 (in Russian)
[11] Brown L., Kwan M., Pieprzyk J., and Seberry J., “Improving resistance to differential cryptanalysis and the redesign of LOKI”, LNCS, 739, 1993, 36–50 | Zbl
[12] Knudsen L. R., “Cryptanalysis of LOKI”, LNCS, 739, 1993, 22–35 | Zbl
[13] Data Encryption Standard (DES). NIST FIPS PUB 46, 1977
[14] Massey J. L., “SAFER K-64: A byte-oriented block-ciphering algorithm”, LNCS, 809, 1994, 1–17 | Zbl
[15] Massey J. L., “SAFER K-64: One year later”, LNCS, 1008, 1995, 212–241 | Zbl
[16] Feistel N., “Cryptography and computer privacy”, Scientific Amer., 228:5 (1973), 15–23 | DOI
[17] Malyshev F. M., “The duality of differential and linear methods in cryptography”, Matem. Vopr. Kriptogr., 5:3 (2014), 35–48 (in Russian)
[18] Malyshev F. M. and Trishin A. E., “Linear and differential cryptanalysis: Another viewpoint.”, Matem. Vopr. Kriptogr., 11:2 (2020), 83–98 | MR | Zbl
[19] Malyshev F. M. and Trifonov D. I., “Diffusion properties of XSLP-ciphers”, Matem. Vopr. Kriptogr., 7:3 (2016), 47–60 (in Russian) | MR | Zbl
[20] Fedchenko V. A., “Diffusion rates of linear medium in AES-like ciphers”, Matem. Vopr. Kriptogr., 8:3 (2017), 109–126 (in Russian) | MR | Zbl