. Ddtui,

. Ddtutransposei,

. Latti,

. Latui,

. Latutransposei,

, for i in range(16): dico_DDT

, dico_DDT

, Utranspose"+str(i)) (mat): return [[ abs(mat[i][j]) for j in range (mat.ncols())] for i in range, dico_DDT

, range(16)): signature=(i,k1,k0) #used to identify the component we are looking at latint=spectrum_to_int, dico_DDT_and_LAT=defaultdict(list) for i,k1,k0 in itertools.product(range(16),range(16)

, (i,k1,k0)!=(j,k1j,k0j)): if(len(affine_equivalence, Affine Equivalence for key in dico_DDT_and_LAT: for (i,k1,k0) in dico_DDT_and_LAT[key]: for (j,k1j,k0j) in dico_DDT_and_LAT

, Chi-squared Distribution Table (d.f. means "degree of freedom"), vol.5

B. Rev, Dual-mode Cellular System: Authentication, Message Encryption, Voice Privacy Mask Generation, Shared Secret Data Generation, A-Key Verification, and Test Data, 1992.

Z. Bao, J. Guo, S. Ling, and Y. Sasaki, Sok: Peigen -a platform for evaluation, implementation, and generation of s-boxes, 2019.

E. Biham and A. Shamir, Differential cryptanalysis of DES-like cryptosystems, Advances in Cryptology-CRYPTO' 90, vol.537, pp.2-21, 1991.

, The Sage Developers. SageMath, the Sage Mathematics Software System, 2017.

J. Daemen and V. Rijmen, AES submission document on Rijndael, 1998.

J. Daemen and V. Rijmen, Probability distributions of correlation and differentials in block ciphers, Journal of Mathematical Cryptology, vol.1, issue.3, pp.221-242, 2007.

J. Reeds and I. , Cryptosystem for cellular telephony, vol.5, 1991.

J. Jean, T. Peyrin, S. Sim, and J. Tourteaux, Optimizing implementations of lightweight building blocks, IACR Transactions on Symmetric Cryptology, vol.2017, issue.4, pp.130-168, 2017.

M. Matsui and A. Yamagishi, A new method for known plaintext attack of feal cipher, Advances in Cryptology -EUROCRYPT' 92, vol.1440, pp.81-91, 1993.

L. Perrin and . Cryptanalysis, Reverse-Engineering and Design of Symmetric Cryptographic Algorithms, 2017.

L. Perrin, SboxU (S-box utils), 2019.

F. Quick, Published by the 3rd Generation Partnership Project 2 "3GPP2, 2009.

A. Tardy-corfdir and H. Gilbert, A known plaintext attack of feal-4 and feal-6, Advances in Cryptology -CRYPTO '91, vol.576, pp.172-182, 1992.

D. Wagner, B. Schneier, and J. Kelsey, Cryptanalysis of the cellular message encryption algorithm, Advances in Cryptology -CRYPTO '97, vol.1294, pp.526-537, 1997.