Exhaustive search for small dimension recursive MDS diffusion layers for block ciphers and hash functions, 2013 IEEE International Symposium on Information Theory, pp.1551-1555, 2013. ,
DOI : 10.1109/ISIT.2013.6620487
URL : https://hal.archives-ouvertes.fr/hal-00823082
Direct Construction of Recursive MDS Diffusion Layers Using Shortened BCH Codes, Fast Software Encryption, FSE 2014, 2014. ,
DOI : 10.1007/978-3-662-46706-0_1
URL : https://hal.archives-ouvertes.fr/hal-01044597
Direct Construction of Recursive MDS Diffusion Layers Using Shortened BCH Codes ,
DOI : 10.1007/978-3-662-46706-0_1
URL : https://hal.archives-ouvertes.fr/hal-01044597
Construction of Recursive MDS Diffusion Layers from Gabidulin Codes, INDOCRYPT 2013, pp.274-285, 2013. ,
DOI : 10.1007/978-3-319-03515-4_18
URL : https://hal.archives-ouvertes.fr/hal-00913852
Construction of new MDS codes from Gabidulin codes, Proceedings of ACCT 2009, pp.40-47, 2004. ,
URL : https://hal.archives-ouvertes.fr/hal-00068463
The Khazad Legacy-Level Block Cipher, Submission to the NESSIE Project, 2000. ,
Cipher and hash function design, strategies based on linear and differential cryptanalysis, 1995. ,
The block cipher Square, Fast Software Encryption, pp.149-165, 1997. ,
DOI : 10.1007/BFb0052343
The Design of Rijndael: AES -The Advanced Encryption Standard, Information Security and Cryptography, 2002. ,
DOI : 10.1007/978-3-662-04722-4
The Maelstrom-0 Hash Function, Proceedings of the 6th Brazilian Symposium on Information and Computer Systems Security, 2006. ,
Theory of codes with maximum rank distance, Problems of Information Transmission (English translation of Problemy Peredachi Informatsii), 1985. ,
Gr?stl a SHA-3 Candidate, Submission to NIST, 2008. ,
The PHOTON Family of Lightweight Hash Functions, CRYPTO 2011, pp.222-239, 2011. ,
DOI : 10.1007/978-3-642-22792-9_13
The LED Block Cipher, CHES 2011, pp.326-341, 2011. ,
DOI : 10.1007/978-3-642-23951-9_22
On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography, CD-ARES Workshops 2013, pp.29-43, 2013. ,
DOI : 10.1007/978-3-642-40588-4_3
URL : https://hal.archives-ouvertes.fr/hal-01506562
Perfect Diffusion Primitives for Block Ciphers, Selected Areas in Cryptography, pp.84-99, 2004. ,
DOI : 10.1007/978-3-540-30564-4_6
FOX : A New Family of Block Ciphers, Selected Areas in Cryptography, pp.114-129, 2004. ,
DOI : 10.1007/978-3-540-30564-4_8
The Theory of Error-Correcting Codes, 1988. ,
Polynomials arising in factoring generalized Vandermonde determinants: an algorithm for computing their coefficients, Mathematical and Computer Modelling, pp.271-281, 2001. ,
DOI : 10.1016/S0895-7177(01)00060-7
A New Involutory MDS Matrix for the AES, In International Journal of Network Security, vol.9, issue.2, pp.109-116, 2009. ,
The cipher SHARK, Fast Software Encryption, pp.99-112, 1996. ,
DOI : 10.1007/3-540-60865-6_47
Recursive Diffusion Layers for Block Ciphers and Hash Functions, Fast Software Encryption 2012, pp.385-401, 2012. ,
DOI : 10.1007/978-3-642-34047-5_22
Twofish: A 128-bit block cipher, The first AES Candidate Conference. National Institute for Standards and Technology, 1998. ,
The Twofish encryption algorithm, 1999. ,
Black box cryptanalysis of hash networks based on multipermutations, EUROCRYPT 1994, pp.47-57, 1995. ,
DOI : 10.1007/BFb0053423
Communication Theory of Secrecy Systems*, Bell Syst, pp.656-715, 1949. ,
DOI : 10.1002/j.1538-7305.1949.tb00928.x
On the need for multipermutations: Cryptanalysis of MD4 and SAFER, Fast Software Encryption, pp.286-297, 1994. ,
DOI : 10.1007/3-540-60590-8_22
A New Keystream Generator MUGI, Fast Software Encryption 2002, pp.179-194, 2002. ,
DOI : 10.1007/3-540-45661-9_14
Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions, Selected Areas in Cryptography 2013, pp.355-371, 2013. ,
DOI : 10.1007/978-3-642-35999-6_23