Boolean Functions for Cryptography and Error-Correcting Codes.
C Carlet, Y Crama, PL Hammer - 2010 - books.google.com
A fundamental objective of cryptography is to enable two persons to communicate over an
insecure channel (a public channel such as the internet) in such a way that any other person …
insecure channel (a public channel such as the internet) in such a way that any other person …
Links between differential and linear cryptanalysis
Linear cryptanalysis, introduced last year by Matsui, will most certainly open-up the way to
new attack methods which may be made more efficient when compared or combined with …
new attack methods which may be made more efficient when compared or combined with …
On correlation between the order of S-boxes and the strength of DES
This paper introduces a practical algorithm for deriving the best differential characteristic and
the best linear expression of DES. Its principle is based on a duality between differential …
the best linear expression of DES. Its principle is based on a duality between differential …
Fast hashing and rotation-symmetric functions
J Pieprzyk, C Qu - 2024 - openrepository.mephi.ru
Efficient hashing is a centerpiece of modern Cryptography. The progress in computing
technology enables us to use 64-bit machines with the promise of 128-bit machines in the …
technology enables us to use 64-bit machines with the promise of 128-bit machines in the …
[كتاب][B] New stream cipher designs: the eSTREAM finalists
The question “Stream ciphers: dead or alive?” was posed by Adi Shamir. Intended to
provoke debate, the question could not have been better, or more starkly, put. However, it …
provoke debate, the question could not have been better, or more starkly, put. However, it …
GAC—the criterion for global avalanche characteristics of cryptographic functions
We show that some widely accepted criteria for cryptographic functions, including the strict
avalanche criterion (SAC) and the propagation criterion, have various limitations in …
avalanche criterion (SAC) and the propagation criterion, have various limitations in …
Image encryption algorithm using S-box and dynamic Hénon bit level permutation
For the secure transmission of data through the medium of internet, images have significant
importance. Image encryption provides secure transmission of images by converting …
importance. Image encryption provides secure transmission of images by converting …
Nonlinearity bounds and constructions of resilient Boolean functions
In this paper we investigate the relationship between the nonlinearity and the order of
resiliency of a Boolean function. We first prove a sharper version of McEliece theorem for …
resiliency of a Boolean function. We first prove a sharper version of McEliece theorem for …
Heuristic design of cryptographically strong balanced Boolean functions
Advances in the design of Boolean functions using heuristic techniques are reported. A
genetic algorithm capable of generating highly nonlinear balanced Boolean functions is …
genetic algorithm capable of generating highly nonlinear balanced Boolean functions is …
[كتاب][B] Applied cryptography: protocols, algorithms and source code in C
B Schneier - 2017 - books.google.com
From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary
Edition is the most definitive reference on cryptography ever published and is the seminal …
Edition is the most definitive reference on cryptography ever published and is the seminal …