Permutation

Results: 881



#Item
1

Innovations in permutation-based crypto Joan Daemen1,2 based on joint work with Guido Bertoni3 , Seth Hoffert, Michaël Peeters1 , Gilles Van Assche1 and Ronny Van Keer1

Add to Reading List

Source URL: africacrypt2018.aui.ma

Language: English - Date: 2018-05-07 05:47:58
    2

    A so ware interface for K In this note, we propose an interface to K at the level of the sponge and duplex constructions, and inside K at the level of the K - f permutation. The purpose is twofold.

    Add to Reading List

    Source URL: keccak.team

    Language: English - Date: 2017-08-31 09:41:17
      3

      Juxtaposing Catalan permutation classes with monotone ones R. Brignall∗ J. Sliaˇcan∗

      Add to Reading List

      Source URL: users.mct.open.ac.uk

      Language: English - Date: 2017-03-29 10:25:04
        4

        Exponential Sums and Permutation Polynomials Ramachandra’s birthday Exponential Sums and

        Add to Reading List

        Source URL: www.mat.uniroma3.it

        Language: English - Date: 2005-10-13 06:21:20
          5

          Farfalle and Kravatte Parallel permutation-based cryptography Guido Bertoni1 Joan Daemen1,2 Michaël Peeters1 Gilles Van Assche1 Ronny Van Keer1 1 STMicroelectronics

          Add to Reading List

          Source URL: www.cryptolux.org

          Language: English - Date: 2017-01-18 08:26:40
            6

            On a Generalisation of Dillon’s APN Permutation Anne Canteaut Sébastien Duval

            Add to Reading List

            Source URL: jc2-2017.inria.fr

            Language: English - Date: 2017-05-09 09:15:34
              7

              Transitive permutation groups with trivial four point stabilizers Kay Magaard and Rebecca Waldecker Abstract In this paper we analyze the structure of transitive permutation groups that have trivial four point stabilizer

              Add to Reading List

              Source URL: conway1.mathematik.uni-halle.de

              Language: English - Date: 2015-02-18 11:49:00
                8

                Permutation-based encryption, authentication and authenticated encryption Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 , and Gilles Van Assche1 1 2

                Add to Reading List

                Source URL: keccak.team

                Language: English - Date: 2017-08-22 12:54:45
                  9

                  SYMMETRIC POLYNOMIALS KEITH CONRAD Let F be a field. A polynomial f (X1 , . . . , Xn ) ∈ F [X1 , . . . , Xn ] is called symmetric if it is unchanged by any permutation of its variables: f (X1 , . . . , Xn ) = f (Xσ(1)

                  Add to Reading List

                  Source URL: www.math.uconn.edu

                  Language: English - Date: 2017-12-19 15:07:51
                    10

                    Comments Received in Response to: Request for Comments on Draft FIPS 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

                    Add to Reading List

                    Source URL: csrc.nist.gov

                    - Date: 2017-02-24 15:05:30
                      UPDATE