Journals
Publish with us
Publishing partnerships
About us
Blog
IET Information Security
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
IET Information Security
/
2023
/
Article
/
Tab 7
/
Research Article
SAT-Based Security Evaluation for WARP against Linear Cryptanalysis
Table 7
The constraints used to describe the nontrivial mask propagations for the activeness of Sbox.
No.
Clause
No.
Clause
No.
Clause
1
15
28
2
16
29
3
17
30
4
18
31
5
19
32
6
20
33
7
21
34
8
22
35
9
23
36
10
24
37
11
25
38
12
26
39
13
27
40
14