Links between differential and linear cryptanalysis

F Chabaud, S Vaudenay - Workshop on the Theory and Application of of …, 1994 - Springer
Linear cryptanalysis, introduced last year by Matsui, will most certainly open-up the way to
new attack methods which may be made more efficient when compared or combined with …

On correlation between the order of S-boxes and the strength of DES

M Matsui - Advances in Cryptology—EUROCRYPT'94: Workshop …, 1995 - Springer
This paper introduces a practical algorithm for deriving the best differential characteristic and
the best linear expression of DES. Its principle is based on a duality between differential …

Image encryption algorithm using S-box and dynamic Hénon bit level permutation

B Idrees, S Zafar, T Rashid, W Gao - Multimedia Tools and Applications, 2020 - Springer
For the secure transmission of data through the medium of internet, images have significant
importance. Image encryption provides secure transmission of images by converting …

Constructing symmetric ciphers using the CAST design procedure

CM Adams - Designs, Codes and cryptography, 1997 - Springer
This paper describes the CAST design procedure for constructing a family of DES-like
Substitution-Permutation Network (SPN) cryptosystems which appear to have good …

Construction of Nonlinear Component of Block Cipher by Action of Modular Group PSL(2, Z) on Projective Line PL(GF(28))

W Gao, B Idrees, S Zafar, T Rashid - IEEE Access, 2020 - ieeexplore.ieee.org
Substitution box (S-Box) has a prominent significance being the fundamental nonlinear
component of block cipher which fulfils confusion, one of the properties proposed by Claude …

Secured flipped scan-chain model for crypto-architecture

G Sengar, D Mukhopadhyay… - IEEE Transactions on …, 2007 - ieeexplore.ieee.org
Scan chains are exploited to develop attacks on cryptographic hardware and steal
intellectual properties from the chip. This paper proposes a secured strategy to test designs …

Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties

G Ivanov, N Nikolov, S Nikova - Cryptography and Communications, 2016 - Springer
Often the S-boxes are the only nonlinear components in a block cipher and as such play an
important role in ensuring its resistance to cryptanalysis. Cryptographic properties and …

A robust S box design using cyclic groups and image encryption

R Ali, MK Jamil, AS Alali, J Ali, G Afzal - IEEE Access, 2023 - ieeexplore.ieee.org
Modern cryptographic systems use substitution boxes (S-boxes) throughout the encryption
process to enhance the security of the plaintext. The integrity of the communication process …

How to improve the nonlinearity of bijective S-boxes

W Millan - Australasian Conference on information security and …, 1998 - Springer
A method for the systematic improvement of the nonlinearity of bijective substitution boxes is
presented. It is shown how to select two outputs so that swap** them increases the …

Nonlinearity and propagation characteristics of balanced boolean functions

J Seberry, XM Zhang, YL Zheng - Information and Computation, 1995 - Elsevier
Three important criteria for cryptographically strong Boolean functions are balance,
nonlinearity, and the propagation criterion. The main contributions of this paper are to reveal …