2018
DOI: 10.1080/01611194.2018.1428835
|View full text |Cite
|
Sign up to set email alerts
|

Feistel ciphers in East Germany in the communist era

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
22
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 14 publications
(23 citation statements)
references
References 5 publications
1
22
0
Order By: Relevance
“…Some polynomial invariant attacks work for a fraction of keys, other for all possible keys. According to [17,18,26], using longer keys in each round could be a good reason, why many ciphers are likely to be secure against non-linear attacks. However even when many key bits are used in each round, cf.…”
Section: Limitations and Vulnerabilitymentioning
confidence: 99%
See 4 more Smart Citations
“…Some polynomial invariant attacks work for a fraction of keys, other for all possible keys. According to [17,18,26], using longer keys in each round could be a good reason, why many ciphers are likely to be secure against non-linear attacks. However even when many key bits are used in each round, cf.…”
Section: Limitations and Vulnerabilitymentioning
confidence: 99%
“…exactly those where Z j () = 0, are called "transformable" polynomials 25 . Other polynomials Z i are non-zero 26 and they use the same set of input-side variables as Q i . Moreover we assume that for every Z j () this Boolean function is annihilated by product of (up to) all "transformable" polynomials Q k , or more precisely that:…”
Section: Our General Framework Theorem and Constructionmentioning
confidence: 99%
See 3 more Smart Citations