Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
29
views
3
references
Top references
cited by
23
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,577
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
The Wide Trail Design Strategy
other
Author(s):
Joan Daemen
,
Vincent Rijmen
Publication date
(Online):
December 4 2001
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Digitizing Fabrication
Most cited references
3
Record
: found
Abstract
: not found
Article
: not found
Communication Theory of Secrecy Systems*
C. Shannon
(1949)
0
comments
Cited
1042
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Linear approximation of block ciphers
Kaisa Nyberg
(1995)
0
comments
Cited
31
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
A new approach to block cipher design
Joan Daemen
,
René Govaerts
,
Joos Vandewalle
(1994)
0
comments
Cited
14
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2001
Publication date (Online):
December 4 2001
Pages
: 222-238
DOI:
10.1007/3-540-45325-3_20
SO-VID:
3f2ea777-b46b-4374-9166-969bbeed82c3
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
A Statistical Decoding Algorithm for General Linear Block Codes
pp. 9
On the Undetected Error Probability for Shortened Hamming Codes on Channels with Memory
pp. 20
The Complete Weight Enumerator for Codes over M nxs(F q)
pp. 27
Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem
pp. 38
A Simple Soft-Input/Soft-Output Decoder for Hamming Codes
pp. 44
A Technique with an Information-Theoretic Basis for Protecting Secret Data from Differential Power Attacks
pp. 73
The Exact Security of ECIES in the Generic Group Model
pp. 85
A New Ultrafast Stream Cipher Design: COS Ciphers
pp. 99
On Rabin-Type Signatures
pp. 114
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation)
pp. 138
Almost-Certainly Runlength-Limiting Codes
pp. 148
Weight vs. Magnetization Enumerator for Gallager Codes
pp. 158
Graph Configurations and Decoding Performance
pp. 166
A Line Code Construction for the Adder Channel with Rates Higher than Time-Sharing
pp. 176
The Synthesis of TD-Sequences and Their Application to Multi-functional Communication Systems
pp. 191
Improvement of the Delsarte Bound for τ-Designs in Finite Polynomial Metric Spaces
pp. 205
Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding
pp. 222
The Wide Trail Design Strategy
pp. 245
Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies
pp. 277
Unconditionally Secure Key Agreement Protocol
pp. 294
An Efficient Stream Cipher Alpha1 for Mobile and Wireless Devices
pp. 301
Investigation of Linear Codes Possessing Some Extra Properties
pp. 307
Statistical Physics of Low Density Parity Check Error Correcting Codes
pp. 317
Generating Large Instances of the Gong-Harn Cryptosystem
pp. 329
Lattice Attacks on RSA-Encrypted IP and TCP
pp. 339
Spectrally Bounded Sequences, Codes, and States: Graph Constructions and Entanglement
pp. 355
Attacking the Affine Parts of SFLASH
pp. 364
Another Way of Doing RSA Cryptography in Hardware
pp. 374
Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers
pp. 378
A New Search Pattern in Multiple Residue Method (MRM) and Its Importance in the Cryptanalysis of the RSA
pp. 387
A New Undeniable Signature Scheme Using Smart Cards
pp. 395
Non-binary Block Inseparable Errors Control Codes
pp. 402
Cryptanalysis of Nonlinear Filter Generators with (0, 1)-Metric Viterbi Decoding
Similar content
3,577
Systems biology strategy reveals PKCdelta is key for sensitizing TRAIL-resistant human fibrosarcoma
Authors:
K Hayashi
,
S. TABATA
,
V Piras
…
Visual cues and trail-following idiosyncrasy inleptothorax unifasciatus: An orientation process during foraging
Authors:
S Aron
,
J L Deneubourg
,
J Pasteels
Trail Communication Regulated by Two Trail Pheromone Components in the Fungus-Growing Termite Odontotermes formosanus (Shiraki)
Authors:
Ping-Zi Wen
,
Bao-Zhong Ji
,
David Sillam-Dussès
See all similar
Cited by
23
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
Authors:
Florian Mendel
,
Christian Rechberger
,
Martin Schläffer
…
Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
Authors:
Nicky Mouha
,
Qingju Wang
,
Dawu Gu
…
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations
Authors:
Andrey A. Bogdanov
,
Lars Knudsen
,
Gregor Leander
…
See all cited by