Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
28
views
12
references
Top references
cited by
2
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,829
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Applied Cryptography and Network Security
Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers
other
Author(s):
Wentao Zhang
,
Bozhan Su
,
Wenling Wu
,
Dengguo Feng
,
Chuankun Wu
Publication date
(Print):
2012
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Higher order chromatin architecture
Most cited references
12
Record
: found
Abstract
: not found
Book Chapter
: not found
PRESENT: An Ultra-Lightweight Block Cipher
A. Bogdanov
,
L. Knudsen
,
G. Leander
…
(2007)
0
comments
Cited
138
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
The block cipher Square
Joan Daemen
,
Lars Knudsen
,
Vincent Rijmen
(1997)
0
comments
Cited
73
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Integral Cryptanalysis
Lars Knudsen
,
David R. Wagner
(2002)
0
comments
Cited
48
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2012
Pages
: 117-134
DOI:
10.1007/978-3-642-31284-7_8
SO-VID:
441be5d4-5428-48b5-961c-60af00be15ff
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Security Analysis of a Multi-factor Authenticated Key Exchange Protocol
pp. 12
Breaking an Animated CAPTCHA Scheme
pp. 30
Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens
pp. 48
RIKE: Using Revocable Identities to Support Key Escrow in PKIs
pp. 66
TreVisor
pp. 84
Authenticated Encryption: How Reordering Can Impact Performance
pp. 100
Length-Doubling Ciphers and Tweakable Ciphers
pp. 117
Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers
pp. 135
Security Enhancements by OR-Proof in Identity-Based Identification
pp. 153
Identity-Based Extractable Hash Proofs and Their Applications
pp. 171
On Structural Signatures for Tree Data Structures
pp. 188
Inner-Product Lossy Trapdoor Functions and Applications
pp. 206
On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification
pp. 224
Secure Accumulators from Euclidean Rings without Trusted Setup
pp. 241
Linear Fault Analysis of Block Ciphers
pp. 257
Cryptanalysis of 256-Bit Key HyRAL via Equivalent Keys
pp. 275
Distinguishers beyond Three Rounds of the RIPEMD-128/-160 Compression Functions
pp. 293
Zero-Value Point Attacks on Kummer-Based Cryptosystem
pp. 311
PICARO – A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance
pp. 329
Wide Collisions in Practice
pp. 344
A General Construction for 1-Round δ-RMT and (0, δ)-SMT
pp. 363
A Prefiltering Approach to Regular Expression Matching for Network Security Systems
pp. 381
iHTTP: Efficient Authentication of Non-confidential HTTP Traffic
pp. 400
ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches
pp. 418
Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations
pp. 436
The Shy Mayor: Private Badges in GeoSocial Networks
pp. 473
A New Framework for Privacy of RFID Path Authentication
pp. 489
GHB #: A Provably Secure HB-Like Lightweight Authentication Protocol
pp. 507
Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud
pp. 526
SPICE – Simple Privacy-Preserving Identity-Management for Cloud Environment
pp. 544
A Practical Smart Metering System Supporting Privacy Preserving Billing and Load Monitoring
Similar content
1,829
Using Bernstein-Vazirani Algorithm to Attack Block Ciphers
Authors:
Li Gang Yang
,
Huiqin Xie
Efficient and secure multiparty computation from fixed-key block ciphers
Authors:
C. GUO
,
J. KATZ
,
X. Wang
…
On Lai–Massey and quasi-Feistel ciphers
Authors:
Aaram Yun
,
Je Park
,
Jooyoung Kim Yong Kye Kim Hyeon-Kook Choi Ki-Chul Kim Hyoungseok and Jo Han-Gi Lee
See all similar
Cited by
2
Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers
Authors:
Zejun Xiang
,
Wentao Zhang
,
Zhenzhen Bao
…
Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis
Authors:
Bing Sun
,
Zhiqiang Liu
,
Vincent Rijmen
…
See all cited by