This work is supported by the National Natural Science Foundation of China (No.60970134, No.11171323), the IIE's Cryptography Research Project (No.Y2Z0011102), and the Strategic Priority Research Program of the Chinese Academy of Sciences (No.XDA06010701).
Algebraic attacks on stream ciphers exploit annihilators of low degree. From another point of view, we concentrate on annihilators in fewer variables in this paper. This work consists of two parts. Firstly, the concep...
This work is supported by the National Natural Science Foundation of China (No.60970134, No.11171323, No.61173134), the IIE's Cryptography Research Project (No.Y2Z0011102), the Strategic Priority Research PrOgram of the Chinese Academy of Sciences (No.XDA06010701).
Low differential uniformity functions provide good resistance to differential attacks. The AES (Advanced encryption standard) uses a differentially 4 uniform function (the inverse function) as its S-box. We give a...