Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
33
views
3
references
Top references
cited by
23
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,459
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
The Wide Trail Design Strategy
other
Author(s):
Joan Daemen
,
Vincent Rijmen
Publication date
(Online):
December 4 2001
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Digitizing Fabrication
Most cited references
3
Record
: found
Abstract
: not found
Article
: not found
Communication Theory of Secrecy Systems*
C. Shannon
(1949)
0
comments
Cited
1048
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Linear approximation of block ciphers
Kaisa Nyberg
(1995)
0
comments
Cited
31
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
A new approach to block cipher design
Joan Daemen
,
René Govaerts
,
Joos Vandewalle
(1994)
0
comments
Cited
14
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2001
Publication date (Online):
December 4 2001
Pages
: 222-238
DOI:
10.1007/3-540-45325-3_20
SO-VID:
3f2ea777-b46b-4374-9166-969bbeed82c3
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
A Statistical Decoding Algorithm for General Linear Block Codes
pp. 9
On the Undetected Error Probability for Shortened Hamming Codes on Channels with Memory
pp. 20
The Complete Weight Enumerator for Codes over M nxs(F q)
pp. 27
Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem
pp. 38
A Simple Soft-Input/Soft-Output Decoder for Hamming Codes
pp. 44
A Technique with an Information-Theoretic Basis for Protecting Secret Data from Differential Power Attacks
pp. 73
The Exact Security of ECIES in the Generic Group Model
pp. 85
A New Ultrafast Stream Cipher Design: COS Ciphers
pp. 99
On Rabin-Type Signatures
pp. 114
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation)
pp. 138
Almost-Certainly Runlength-Limiting Codes
pp. 148
Weight vs. Magnetization Enumerator for Gallager Codes
pp. 158
Graph Configurations and Decoding Performance
pp. 166
A Line Code Construction for the Adder Channel with Rates Higher than Time-Sharing
pp. 176
The Synthesis of TD-Sequences and Their Application to Multi-functional Communication Systems
pp. 191
Improvement of the Delsarte Bound for τ-Designs in Finite Polynomial Metric Spaces
pp. 205
Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding
pp. 222
The Wide Trail Design Strategy
pp. 245
Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies
pp. 277
Unconditionally Secure Key Agreement Protocol
pp. 294
An Efficient Stream Cipher Alpha1 for Mobile and Wireless Devices
pp. 301
Investigation of Linear Codes Possessing Some Extra Properties
pp. 307
Statistical Physics of Low Density Parity Check Error Correcting Codes
pp. 317
Generating Large Instances of the Gong-Harn Cryptosystem
pp. 329
Lattice Attacks on RSA-Encrypted IP and TCP
pp. 339
Spectrally Bounded Sequences, Codes, and States: Graph Constructions and Entanglement
pp. 355
Attacking the Affine Parts of SFLASH
pp. 364
Another Way of Doing RSA Cryptography in Hardware
pp. 374
Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers
pp. 378
A New Search Pattern in Multiple Residue Method (MRM) and Its Importance in the Cryptanalysis of the RSA
pp. 387
A New Undeniable Signature Scheme Using Smart Cards
pp. 395
Non-binary Block Inseparable Errors Control Codes
pp. 402
Cryptanalysis of Nonlinear Filter Generators with (0, 1)-Metric Viterbi Decoding
Similar content
4,459
TNF-α Induced the Enhanced Apoptosis of Mesenchymal Stem Cells in Ankylosing Spondylitis by Overexpressing TRAIL-R2
Authors:
Zhenhua Liu
,
Liangbin Gao
,
Peng Wang
…
Cannabis use and development of externalizing and internalizing behaviour problems in early adolescence: A TRAILS study.
Authors:
H. Swaab-Barneveld
,
Stephan C J Huijbregts
,
M. Griffith
…
The hydrodynamic trails of Lepomis gibbosus (Centrarchidae), Colomesus psittacus (Tetraodontidae) and Thysochromis ansorgii (Cichlidae) investigated with scanning particle image velocimetry.
Authors:
Horst Bleckmann
,
Wolf Hanke
See all similar
Cited by
23
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
Authors:
Florian Mendel
,
Christian Rechberger
,
Martin Schläffer
…
Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
Authors:
Nicky Mouha
,
Qingju Wang
,
Dawu Gu
…
Tight Security Bounds for Key-Alternating Ciphers
Authors:
Shan Chen
,
John P Steinberger
See all cited by