[BOOK][B] Handbook of finite fields
GL Mullen, D Panario - 2013 - api.taylorfrancis.com
The CRC Handbook of Finite Fields (hereafter referred to as the Handbook) is a reference
book for the theory and applications of finite fields. It is not intended to be an introductory …
book for the theory and applications of finite fields. It is not intended to be an introductory …
An analytical review of current S-box design methodologies, performance evaluation criteria, and major challenges
The expansion of worldwide networking has created new possibilities for management,
development, and presentation in the form of digital data. The uncomplicated accessibility to …
development, and presentation in the form of digital data. The uncomplicated accessibility to …
Survey on recent trends towards generalized differential and boomerang uniformities
Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block and
stream ciphers and cryptographic hash functions. The discovery of differential cryptanalysis …
stream ciphers and cryptographic hash functions. The discovery of differential cryptanalysis …
Block Ciphers – Focus on the Linear Layer (feat. PRIDE)
The linear layer is a core component in any substitution-permutation network block cipher.
Its design significantly influences both the security and the efficiency of the resulting block …
Its design significantly influences both the security and the efficiency of the resulting block …
Observations on the SIMON block cipher family
In this paper we analyse the general class of functions underlying the Simon block cipher. In
particular, we derive efficiently computable and easily implementable expressions for the …
particular, we derive efficiently computable and easily implementable expressions for the …
[BOOK][B] Concise encyclopedia of coding theory
Most coding theory experts date the origin of the subject with the 1948 publication of A
Mathematical Theory of Communication by Claude Shannon. Since then, coding theory has …
Mathematical Theory of Communication by Claude Shannon. Since then, coding theory has …
C-Differentials, Multiplicative Uniformity, and (Almost) Perfect c-Nonlinearity
In this paper we define a new (output) multiplicative differential, and the corresponding c-
differential uniformity. With this new concept, even for characteristic 2, there are perfect c …
differential uniformity. With this new concept, even for characteristic 2, there are perfect c …
Threshold implementations of all 3× 3 and 4× 4 S-boxes
Side-channel attacks have proven many hardware implementations of cryptographic
algorithms to be vulnerable. A recently proposed masking method, based on secret sharing …
algorithms to be vulnerable. A recently proposed masking method, based on secret sharing …
On the differential spectrum and the APcN property of a class of power functions over finite fields
In this paper, we investigate the power function over the finite field, where is a positive
integer and. We prove that this power function is AP with respect to all satisfying, and we …
integer and. We prove that this power function is AP with respect to all satisfying, and we …
Lower bounds on the degree of block ciphers
Lower Bounds on the Degree of Block Ciphers | SpringerLink Skip to main content
Advertisement SpringerLink Account Menu Find a journal Publish with us Track your …
Advertisement SpringerLink Account Menu Find a journal Publish with us Track your …