Boolean Functions for Cryptography and Error-Correcting Codes.

C Carlet, Y Crama, PL Hammer - 2010‏ - books.google.com
A fundamental objective of cryptography is to enable two persons to communicate over an
insecure channel (a public channel such as the internet) in such a way that any other person …

Links between differential and linear cryptanalysis

F Chabaud, S Vaudenay - Workshop on the Theory and Application of of …, 1994‏ - Springer
Linear cryptanalysis, introduced last year by Matsui, will most certainly open-up the way to
new attack methods which may be made more efficient when compared or combined with …

On correlation between the order of S-boxes and the strength of DES

M Matsui - Advances in Cryptology—EUROCRYPT'94: Workshop …, 1995‏ - Springer
This paper introduces a practical algorithm for deriving the best differential characteristic and
the best linear expression of DES. Its principle is based on a duality between differential …

Fast hashing and rotation-symmetric functions

J Pieprzyk, C Qu - 2024‏ - openrepository.mephi.ru
Efficient hashing is a centerpiece of modern Cryptography. The progress in computing
technology enables us to use 64-bit machines with the promise of 128-bit machines in the …

[كتاب][B] New stream cipher designs: the eSTREAM finalists

M Robshaw, O Billet - 2008‏ - Springer
The question “Stream ciphers: dead or alive?” was posed by Adi Shamir. Intended to
provoke debate, the question could not have been better, or more starkly, put. However, it …

GAC—the criterion for global avalanche characteristics of cryptographic functions

XM Zhang, Y Zheng - J. UCS The Journal of Universal Computer Science …, 1996‏ - Springer
We show that some widely accepted criteria for cryptographic functions, including the strict
avalanche criterion (SAC) and the propagation criterion, have various limitations in …

Image encryption algorithm using S-box and dynamic Hénon bit level permutation

B Idrees, S Zafar, T Rashid, W Gao - Multimedia Tools and Applications, 2020‏ - Springer
For the secure transmission of data through the medium of internet, images have significant
importance. Image encryption provides secure transmission of images by converting …

Nonlinearity bounds and constructions of resilient Boolean functions

P Sarkar, S Maitra - Advances in Cryptology—CRYPTO 2000: 20th Annual …, 2000‏ - Springer
In this paper we investigate the relationship between the nonlinearity and the order of
resiliency of a Boolean function. We first prove a sharper version of McEliece theorem for …

Heuristic design of cryptographically strong balanced Boolean functions

W Millan, A Clark, E Dawson - … '98: International Conference on the Theory …, 1998‏ - Springer
Advances in the design of Boolean functions using heuristic techniques are reported. A
genetic algorithm capable of generating highly nonlinear balanced Boolean functions is …

[كتاب][B] Applied cryptography: protocols, algorithms and source code in C

B Schneier - 2017‏ - books.google.com
From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary
Edition is the most definitive reference on cryptography ever published and is the seminal …