Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
19
views
16
references
Top references
cited by
4
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,156
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology — EUROCRYPT ’93
On the Distribution of Characteristics in Bijective Mappings
other
Author(s):
Luke O’Connor
Publication date
(Online):
July 13 2001
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
open (via free pdf)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Renewable Energy – Distribution Grid
Most cited references
16
Record
: found
Abstract
: not found
Article
: not found
Communication Theory of Secrecy Systems*
C. Shannon
(1949)
0
comments
Cited
1039
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Differential cryptanalysis of DES-like cryptosystems
Adi Shamir
,
Eli Biham
(1991)
0
comments
Cited
105
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Cryptography and Computer Privacy
Horst Feistel
(1973)
0
comments
Cited
68
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Pages
: 360-370
DOI:
10.1007/3-540-48285-7_31
SO-VID:
398fffc4-56dc-42ff-88ca-51449b526df7
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
On the Relation Between A-Codes and Codes Correcting Independent Errors
pp. 453
Markov Ciphers and Alternating Groups
pp. 55
Differentially uniform mappings for cryptography
pp. 65
On Almost Perfect Nonlinear Permutations
pp. 77
Two New Classes of Bent Functions
pp. 126
Nonperfect Secret Sharing Schemes and Matroids
pp. 181
On Constructions and Nonlinearity of Correlation Immune Functions
pp. 200
Practical and Provably Secure Release of a Secret and Exchange of Signatures
pp. 218
Subliminal Communication is Easy Using the DSA
pp. 248
Efficient Anonymous Channel and All/Nothing Election Scheme
pp. 274
One-Way Accumulators: A Decentralized Alternative to Digital Signatures
pp. 293
Collisions for the compression function of MD5
pp. 318
Single Term Off-Line Coins
pp. 329
Improved Privacy in Wallets with Observers
pp. 344
Distance-Bounding Protocols
pp. 360
On the Distribution of Characteristics in Bijective Mappings
pp. 386
Linear Cryptanalysis Method for DES Cipher
pp. 398
New Types of Cryptanalytic Attacks Using Related Keys
pp. 410
Secret-Key Reconciliation by Public Discussion
Similar content
3,156
Constructing the bijective and the extended Burrows-Wheeler transform in linear time
Authors:
Semantic Preserving Bijective Mappings of Mathematical Formulae Between Document Preparation Systems and Computer Algebra Systems
Authors:
Howard S. Cohl
,
Moritz Schubotz
,
Abdou Youssef
…
A bijective proof of the hook-length formula
Authors:
D.S. Franzblau
,
Doron Zeilberger
See all similar
Cited by
7
Linear Cryptanalysis Using Multiple Approximations
Authors:
Burton Kaliski
,
M. J. B. Robshaw
The cipher SHARK
Authors:
Vincent Rijmen
,
Joan Daemen
,
Bart Preneel
…
Unbalanced Feistel networks and block cipher design
Authors:
Bruce Schneier
,
John H. Kelsey
See all cited by