Links between differential and linear cryptanalysis
F Chabaud, S Vaudenay - Workshop on the Theory and Application of of …, 1994 - Springer
Linear cryptanalysis, introduced last year by Matsui, will most certainly open-up the way to
new attack methods which may be made more efficient when compared or combined with …
new attack methods which may be made more efficient when compared or combined with …
On correlation between the order of S-boxes and the strength of DES
M Matsui - Advances in Cryptology—EUROCRYPT'94: Workshop …, 1995 - Springer
This paper introduces a practical algorithm for deriving the best differential characteristic and
the best linear expression of DES. Its principle is based on a duality between differential …
the best linear expression of DES. Its principle is based on a duality between differential …
Image encryption algorithm using S-box and dynamic Hénon bit level permutation
For the secure transmission of data through the medium of internet, images have significant
importance. Image encryption provides secure transmission of images by converting …
importance. Image encryption provides secure transmission of images by converting …
Constructing symmetric ciphers using the CAST design procedure
CM Adams - Designs, Codes and cryptography, 1997 - Springer
This paper describes the CAST design procedure for constructing a family of DES-like
Substitution-Permutation Network (SPN) cryptosystems which appear to have good …
Substitution-Permutation Network (SPN) cryptosystems which appear to have good …
Construction of Nonlinear Component of Block Cipher by Action of Modular Group PSL(2, Z) on Projective Line PL(GF(28))
Substitution box (S-Box) has a prominent significance being the fundamental nonlinear
component of block cipher which fulfils confusion, one of the properties proposed by Claude …
component of block cipher which fulfils confusion, one of the properties proposed by Claude …
Secured flipped scan-chain model for crypto-architecture
G Sengar, D Mukhopadhyay… - IEEE Transactions on …, 2007 - ieeexplore.ieee.org
Scan chains are exploited to develop attacks on cryptographic hardware and steal
intellectual properties from the chip. This paper proposes a secured strategy to test designs …
intellectual properties from the chip. This paper proposes a secured strategy to test designs …
Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties
G Ivanov, N Nikolov, S Nikova - Cryptography and Communications, 2016 - Springer
Often the S-boxes are the only nonlinear components in a block cipher and as such play an
important role in ensuring its resistance to cryptanalysis. Cryptographic properties and …
important role in ensuring its resistance to cryptanalysis. Cryptographic properties and …
A robust S box design using cyclic groups and image encryption
Modern cryptographic systems use substitution boxes (S-boxes) throughout the encryption
process to enhance the security of the plaintext. The integrity of the communication process …
process to enhance the security of the plaintext. The integrity of the communication process …
How to improve the nonlinearity of bijective S-boxes
W Millan - Australasian Conference on information security and …, 1998 - Springer
A method for the systematic improvement of the nonlinearity of bijective substitution boxes is
presented. It is shown how to select two outputs so that swap** them increases the …
presented. It is shown how to select two outputs so that swap** them increases the …
Nonlinearity and propagation characteristics of balanced boolean functions
Three important criteria for cryptographically strong Boolean functions are balance,
nonlinearity, and the propagation criterion. The main contributions of this paper are to reveal …
nonlinearity, and the propagation criterion. The main contributions of this paper are to reveal …