Impossible differential cryptanalysis of reduced-round <inline-formula><alternatives><math xmlns:mml="http://www.w3.org/1998/Math/MathML" id="M2"><msup><mrow><mi mathvariant="bold-italic">μ</mi></mrow><mrow><mn mathvariant="normal">2</mn></mrow></msup></math><graphic specific-use="big" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="alternativeImage/22C9D519-EA4F-4e54-A8CF-1ACB826F2179-M002.jpg"><?fx-imagestate width="5.50333309" height="5.58799982"?></graphic><graphic specific-use="small" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="alternativeImage/22C9D519-EA4F-4e54-A8CF-1ACB826F2179-M002c.jpg"><?fx-imagestate width="5.50333309" height="5.58799982"?></graphic></alternatives></inline-formula> algorithm based on matrix method
To evaluate the security of <inline-formula><alternatives><math xmlns:mml="http://www.w3.org/1998/Math/MathML" id="M8"><msup><mrow><mi>μ</mi></mrow><mrow><mn mathvariant="normal">2</mn></mrow></m...
Saved in:
Main Authors: | DU Xiaoni, YU Tian, JIA Meichun, LIANG Lifang |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2024-11-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024196/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
广西君武森林公园海南<inline-graphic specific-use="print" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="media/B4D6FA2C-B364-4618-A801-270856712B32-F501.tif" id="InlineGraphic1"><?fx-imagestate width="8.89000034" height="9.48266602" fontsize="9.878"?></inline-graphic><inline-graphic specific-use="big" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="alternativeImage/B4D6FA2C-B364-4618-A801-270856712B32-F501.jpg"><?fx-imagestate width="8.89000034" height="9.48266602" fontsize="9.878"?></inline-graphic><inline-graphic specific-use="small" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="alternativeImage/B4D6FA2C-B364-4618-A801-270856712B32-F501c.jpg"><?fx-imagestate width="8.89000034" height="9.48266602" fontsize="9.878"?></inline-graphic>繁殖生态和巢址选择
by: 谭丽凤, et al.
Published: (2023-08-01) -
Analysis on the Spindle Bearing Force of RV Reducers Based on the Fuzzy Theory—Wang Xinlong<sup>1</sup> Pang Xiaoxu<sup>1,2,3</sup> Qiu Ming<sup>1,2,3</sup> Shen Wenliang<inline-formula><alternatives><math xmlns:mml="http://www.w3.org/1998/Math/MathML" id="M1"><msup><mrow/><mrow><mn mathvariant="normal">4</mn></mrow></msup></math><graphic specific-use="big" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="alternativeImage/9BC3B3FF-5BF1-4ec1-B5C3-E75C22F01D41-M001.jpg"><?fx-imagestate width="1.18533325" height="3.30200005"?></graphic><graphic specific-use="small" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="alternativeImage/9BC3B3FF-5BF1-4ec1-B5C3-E75C22F01D41-M001c.jpg"><?fx-imagestate width="1.18533325" height="3.30200005"?></graphic></alternatives></inline-formula>
by: Wang Xinlong, et al.
Published: (2023-07-01) -
Permutations from APN power functions over <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <msub> <mi>F</mi> <mrow> <msup> <mn>2</mn> <mrow> <mn>2</mn><mi>n</mi></mrow> </msup> </mrow> </msub> </math></inline-formula>
by: Shi-zhu TIAN
Published: (2017-10-01) -
IFN-<inline-formula><math display="inline"><semantics><mrow><mo>τ</mo></mrow></semantics></math></inline-formula> Maintains Immune Tolerance by Promoting M2 Macrophage Polarization via Modulation of Bta-miR-30b-5p in Early Uterine Pregnancy in Dairy Cows
by: Xinyu Feng, et al.
Published: (2025-01-01) -
Research on <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <msub> <mi>F</mi> <mrow> <msup> <mi>p</mi> <mn>2</mn> </msup> </mrow> </msub></math></inline-formula>-FIOSmodular multiplication algorithm for bilinear pairs and its implementation architecture
by: Zhanpeng JIANG, et al.
Published: (2022-02-01)