Zobrazeno 1 - 10
of 23
pro vyhledávání: '"Bimal Mandal"'
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss 1 (2020)
At Eurocrypt 2018, Cid et al. introduced the Boomerang Connectivity Table (BCT), a tool to compute the probability of the middle round of a boomerang distinguisher from the description of the cipher’s Sbox(es). Their new table and the following wor
Externí odkaz:
https://doaj.org/article/65a5a4d3bf0f4d0b85494bb1f10b9a42
Publikováno v:
Discrete Applied Mathematics. 307:191-211
Differential analysis is an important cryptanalytic technique on block ciphers. In one form, this measures the probability of occurrence of the differences between certain input vectors and the corresponding output vectors. For this analysis, the con
Publikováno v:
Codes, Cryptology and Information Security ISBN: 9783031330162
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7488556b73281baaf0b01357001e49e2
https://doi.org/10.1007/978-3-031-33017-9_10
https://doi.org/10.1007/978-3-031-33017-9_10
Publikováno v:
Cryptography and Communications. 14:691-735
Publikováno v:
Applicable Algebra in Engineering, Communication and Computing. 33:237-260
In this paper we investigate different questions related to bent–negabent functions. We first take an expository look at the state-of-the-art research in this domain and point out some technical flaws in certain results and fix some of them. Furthe
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031229114
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::766d1908670b2c0a1ab8148a49f6ea36
https://doi.org/10.1007/978-3-031-22912-1_20
https://doi.org/10.1007/978-3-031-22912-1_20
Autor:
Bimal Mandal
Publikováno v:
Research Journal of Humanities and Social Sciences. :120-122
Ancient Indian Education was value based. Dealing with values and moral issues is recognised as an integral part of teachers’ roles. Now, education has an enormous role to play in the social, intellectual and political transformation of the world.
Publikováno v:
Applicable Algebra in Engineering, Communication and Computing. 30:387-401
In this paper we prove that all bent functions in the Kerdock code, except for the coset of the symmetric quadratic bent function, are bent–negabent. In this direction, we characterize the set of quadratic bent–negabent functions and show some re
Publikováno v:
SIAM Journal on Discrete Mathematics. 33:238-256
Kavut, Selçuk (Balikesir Author)
Very recently, a class of cryptographically significant Boolean functions were constructed by Tang and Maitra [IEEE Trans. Inform. Theory, 64 ( 2018), pp. 393-402] by modifying the PSap class of bent functions.
Very recently, a class of cryptographically significant Boolean functions were constructed by Tang and Maitra [IEEE Trans. Inform. Theory, 64 ( 2018), pp. 393-402] by modifying the PSap class of bent functions.
Publikováno v:
IACR Transactions on Symmetric Cryptology
IACR Transactions on Symmetric Cryptology, 2020, 2020 (1), pp.331-362. ⟨10.13154/tosc.v2020.i1.331-362⟩
IACR Transactions on Symmetric Cryptology, Ruhr Universität Bochum, 2020, 2020 (1), pp.331-362. ⟨10.13154/tosc.v2020.i1.331-362⟩
IACR Transactions on Symmetric Cryptology; Volume 2020, Issue 1; 331-362
IACR Transactions on Symmetric Cryptology, 2020, 2020 (1), pp.331-362. ⟨10.13154/tosc.v2020.i1.331-362⟩
IACR Transactions on Symmetric Cryptology, Ruhr Universität Bochum, 2020, 2020 (1), pp.331-362. ⟨10.13154/tosc.v2020.i1.331-362⟩
IACR Transactions on Symmetric Cryptology; Volume 2020, Issue 1; 331-362
International audience; At Eurocrypt 2018, Cid et al. introduced the Boomerang Connectivity Table (BCT), a tool to compute the probability of the middle round of a boomerang distinguisher from the description of the cipher’s Sbox(es). Their new tab
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b0ab4f347b125662ded2405f3ab8a0f4
https://inria.hal.science/hal-02945065/document
https://inria.hal.science/hal-02945065/document