[BOOK][B] Handbook of finite fields

GL Mullen, D Panario - 2013 - api.taylorfrancis.com
The CRC Handbook of Finite Fields (hereafter referred to as the Handbook) is a reference
book for the theory and applications of finite fields. It is not intended to be an introductory …

An analytical review of current S-box design methodologies, performance evaluation criteria, and major challenges

A Waheed, F Subhan, MM Suud, M Alam… - Multimedia Tools and …, 2023 - Springer
The expansion of worldwide networking has created new possibilities for management,
development, and presentation in the form of digital data. The uncomplicated accessibility to …

Survey on recent trends towards generalized differential and boomerang uniformities

S Mesnager, B Mandal, M Msahli - Cryptography and Communications, 2022 - Springer
Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block and
stream ciphers and cryptographic hash functions. The discovery of differential cryptanalysis …

Block Ciphers – Focus on the Linear Layer (feat. PRIDE)

MR Albrecht, B Driessen, EB Kavun, G Leander… - Advances in Cryptology …, 2014 - Springer
The linear layer is a core component in any substitution-permutation network block cipher.
Its design significantly influences both the security and the efficiency of the resulting block …

Observations on the SIMON block cipher family

S Kölbl, G Leander, T Tiessen - … , Santa Barbara, CA, USA, August 16-20 …, 2015 - Springer
In this paper we analyse the general class of functions underlying the Simon block cipher. In
particular, we derive efficiently computable and easily implementable expressions for the …

[BOOK][B] Concise encyclopedia of coding theory

WC Huffman, JL Kim, P Solé - 2021 - api.taylorfrancis.com
Most coding theory experts date the origin of the subject with the 1948 publication of A
Mathematical Theory of Communication by Claude Shannon. Since then, coding theory has …

C-Differentials, Multiplicative Uniformity, and (Almost) Perfect c-Nonlinearity

P Ellingsen, P Felke, C Riera, P Stănică… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
In this paper we define a new (output) multiplicative differential, and the corresponding c-
differential uniformity. With this new concept, even for characteristic 2, there are perfect c …

Threshold implementations of all 3× 3 and 4× 4 S-boxes

B Bilgin, S Nikova, V Nikov, V Rijmen… - International workshop on …, 2012 - Springer
Side-channel attacks have proven many hardware implementations of cryptographic
algorithms to be vulnerable. A recently proposed masking method, based on secret sharing …

On the differential spectrum and the APcN property of a class of power functions over finite fields

Z Tu, N Li, Y Wu, X Zeng, X Tang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this paper, we investigate the power function over the finite field, where is a positive
integer and. We prove that this power function is AP with respect to all satisfying, and we …

Lower bounds on the degree of block ciphers

P Hebborn, B Lambin, G Leander, Y Todo - Advances in Cryptology …, 2020 - Springer
Lower Bounds on the Degree of Block Ciphers | SpringerLink Skip to main content
Advertisement SpringerLink Account Menu Find a journal Publish with us Track your …