CSpace

Browse/Search Results:  1-4 of 4 Help

  Show only claimed items
Selected(0)Clear Items/Page:    Sort:
Involutory differentially 4-uniform permutations from known constructions 期刊论文
DESIGNS CODES AND CRYPTOGRAPHY, 2019, 卷号: 87, 期号: 1, 页码: 31-56
Authors:  Fu, Shihui;  Feng, Xiutao
Favorite  |  View/Download:3/0  |  Submit date:2019/03/05
Involution  Differentially 4-uniform permutation  Nonlinearity  Permutation  Algebraic degree  06E30  14G50  94A60  
Fault Attack on ACORN v3 期刊论文
COMPUTER JOURNAL, 2018, 卷号: 61, 期号: 8, 页码: 1166-1179
Authors:  Zhang, Xiaojuan;  Feng, Xiutao;  Lin, Dongdai
Favorite  |  View/Download:4/0  |  Submit date:2018/09/08
CAESAR  authenticated cipher  stream cipher  ACORN  fault attack  
Fault Attack on the Authenticated Cipher ACORN v2 期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2017, 页码: 16
Authors:  Zhang, Xiaojuan;  Feng, Xiutao;  Lin, Dongdai
Favorite  |  View/Download:5/0  |  Submit date:2018/07/30
On algebraic immunity of trace inverse functions on finite fields of characteristic two 期刊论文
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2016, 卷号: 29, 期号: 1, 页码: 272-288
Authors:  Feng Xiutao;  Gong Guang
Favorite  |  View/Download:4/0  |  Submit date:2018/07/30
Algebraic immunity  boolean functions  fast algebraic attacks  trace inverse functions