“Linear Approximations of Pseudo-Hadamard Transform,” Chinese Journal of Electronics, vol. 21, no. 4, pp. 715-718, 2012,
Citation: “Linear Approximations of Pseudo-Hadamard Transform,” Chinese Journal of Electronics, vol. 21, no. 4, pp. 715-718, 2012,

Linear Approximations of Pseudo-Hadamard Transform

  • Received Date: 2011-04-01
  • Rev Recd Date: 2011-05-01
  • Publish Date: 2012-10-25
  • In FSE 2003, Johan Wall′en proposed efficient log-time algorithms for computing linear approximations of addition modulo 2n. They posed that his algorithms can be generalized to more complex functions such as Pseudo-Hadamard Transform, but didn’t to the readers. In this paper, we present a formula for computing linear correlation of Pseudo-Hadamard Transform.
  • loading
  • Mitsuru Matsui, “Linear cryptanalysis method for DES cipher”,in Advances in Cryptology-Eurocrypt 1993, Vol.765 of LectureNotes in Computer Science, pp.386-397, Springer-Verlag, 1993.
    Johan Wallen, “Linear approximations of addition modulo 2n”,in Fast Software Encryption 2003, Vol.2887 of Lecture Notes inComputer Science, pp.261-273, Springer-Verlag, 2003.
    James L. Massey, “SAFER K-64: A byte-oriented blockcipheringalgorithm”, in Ross Anderson, Fast Software Encryption’93, Vol.809 of Lecture Notes in Computer Science, pp.1-17,Springer-Verlag, 1993.
    Bruce Schneier, John Kelsey, Doug Whiting, David Wagner etal., The Twofish Encryption Algorithm: A 128-Bit Block Cipher,John Wiley & Sons, New York, USA, 1999.
    Eli Biham and Adi Shamir, “Differential cryptanalysis of DESlikecryptosystems”, Journal of Cryptology, Vol.4, No.1, pp.3-72, 1991.
    Helger Lipmaa, “On differential properties of Pseudo-Hadamardtransform and related mappings”, in Progress in Cryptology-Indocrypt 2002, Vol.2551 of Lecture Notes in Computer Science,pp.48-61, Springer-Verlag, 2002.
    Helger Lipmaa and Shiho Moriai, “Efficient algorithms for computingdifferential properties of addition”, Fast Software Encryption’2001, Vol.2355 of Lecture Notes in Computer Science,pp.336-350, Springer-Verlag, 2002.
    Hiroshi Miyano, “Addend dependency of differential/linearprobability of addition”, IEICE Trans. Fundamentals, Vol.81,No.1, pp.106-109, 1998.
    Zhang Wentao, Qing Sihan, Wu Wenling, “Improveddifferential-linear cryptanalysis of reduced-round SAFER++”,Chinese Journal of Electronics, Vol.13, No.1, pp.111-115, 2004.
  • 加载中


    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (627) PDF downloads(920) Cited by()
    Proportional views


    DownLoad:  Full-Size Img  PowerPoint