Canteaut, Anne; Charpin, Pascale; Dobbertin, Hans A new characterization of almost bent functions. (English) Zbl 1004.94019 Knudsen, Lars (ed.), Fast software encryption. 6th international workshop, FSE ‘99. Rome, Italy, March 24-26, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1636, 186-200 (1999). Reviewer: R.-H.Schulz (Berlin) MSC: 94A60 94C10 PDF BibTeX XML Cite \textit{A. Canteaut} et al., Lect. Notes Comput. Sci. 1636, 186--200 (1999; Zbl 1004.94019)
Zhang, Xian-Mo; Zheng, Yuliang On the difficulty of constructing cryptographically strong substitution boxes. (English) Zbl 0959.94022 Maurer, Hermann (ed.) et al., J.UCS. Journal of Universal Computer Science. Vol. 2, 1996. Annual print and CD-ROM archive edition. With 1 CD-ROM (Windows and UNIX) containing full archive, 1994-1996. Berlin: Springer. 147-162 (1998). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{X.-M. Zhang} and \textit{Y. Zheng}, in: J. UCS. Journal of Universal Computer Science. Vol. 2, 1996. Annual print and CD-ROM archive edition. With 1 CD-ROM (Windows and UNIX) containing full archive, 1994--1996. Berlin: Springer. 147--162 (1998; Zbl 0959.94022)
Shimoyama, Takeshi; Moriai, Shiho; Kaneko, Toshinobu Improving the higher order differential attack and cryptanalysis of the \(\mathcal{KN}\) cipher. (English) Zbl 0930.94024 Okamoto, Eiji (ed.) et al., Information security. 1st international workshop, ISW ’97, Tatsunokuchi, Ishikawa, Japan, September 17–19, 1997. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1396, 32-42 (1998). MSC: 94A60 PDF BibTeX XML Cite \textit{T. Shimoyama} et al., Lect. Notes Comput. Sci. 1396, 32--42 (1998; Zbl 0930.94024)
Klein, Andreas A new iterative cryptosystem. (Ein neues iteratives Kryptosystem.) (German) Zbl 0876.68040 Mitt. Math. Semin. Gießen 229, 29-44 (1997). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{A. Klein}, Mitt. Math. Semin. Gießen 229, 29--44 (1997; Zbl 0876.68040)
Ben-Aroya, Ishai; Biham, Eli Differential cryptanalysis of Lucifer. (English) Zbl 0844.94010 J. Cryptology 9, No. 1, 21-34 (1996). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{I. Ben-Aroya} and \textit{E. Biham}, J. Cryptology 9, No. 1, 21--34 (1996; Zbl 0844.94010) Full Text: DOI
Knudsen, L. Ramkilde Cryptanalysis of LOKI. (English) Zbl 0827.94021 Ganley, M. J. (ed.), Cryptography and coding III. Based on the proceedings of the 3rd conference organized by the Institute of Mathematics and its Applications on cryptography and coding, held at Cirencester, GB, on Dec. 16-18, 1991. Oxford: Clarendon Press. Inst. Math. Appl. Conf. Ser., New Ser. 45, 223-236 (1993). MSC: 94A60 PDF BibTeX XML Cite \textit{L. R. Knudsen}, in: Cryptography and coding III. Based on the proceedings of the 3rd conference organized by the Institute of Mathematics and its Applications on cryptography and coding, held at Cirencester, GB, on Dec. 16-18, 1991. Oxford: Clarendon Press. 223--236 (1993; Zbl 0827.94021)
Daemen, Joan Limitations of the Even-Mansour construction. (English) Zbl 0825.94187 Imai, Hideki (ed.) et al., Advances in Cryptology - ASIACRYPT ’91. International conference on the theory and application of cryptology, Fujiyoshida, Japan, November 11-14, 1991. Proceedings. Berlin: Springer- Verlag. Lect. Notes Comput. Sci. 739, 495-498 (1993). MSC: 94A60 68Q25 PDF BibTeX XML Cite \textit{J. Daemen}, Lect. Notes Comput. Sci. 739, 495--498 (1993; Zbl 0825.94187) Full Text: DOI
Adams, Carlisle M. On immunity against Biham and Shamir’s ”differential cryptanalysis”. (English) Zbl 0743.68057 Inf. Process. Lett. 41, No. 2, 77-80 (1992). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{C. M. Adams}, Inf. Process. Lett. 41, No. 2, 77--80 (1992; Zbl 0743.68057) Full Text: DOI