[LIVRE][B] Cryptographic Boolean functions and applications
TW Cusick, P Stanica - 2017 - books.google.com
Cryptographic Boolean Functions and Applications, Second Edition is designed to be a
comprehensive reference for the use of Boolean functions in modern cryptography. While …
comprehensive reference for the use of Boolean functions in modern cryptography. While …
Efficient image encryption scheme using Henon map, dynamic S-boxes and elliptic curve cryptography
Image encryption schemes can be vulnerable to a variety of cryptanalysis attacks. The use of
key-dependent dynamic S-boxes has been shown to improve security. Threats of chosen …
key-dependent dynamic S-boxes has been shown to improve security. Threats of chosen …
Efficient key-dependent dynamic S-boxes based on permutated elliptic curves
Key-dependent dynamic substitution boxes (S-boxes) are important building blocks of many
image encryption schemes, in which a session key controls the construction of dynamic S …
image encryption schemes, in which a session key controls the construction of dynamic S …
Accurate estimates of the data complexity and success probability for various cryptanalyses
Many attacks on encryption schemes rely on statistical considerations using
plaintext/ciphertext pairs to find some information on the key. We provide here simple …
plaintext/ciphertext pairs to find some information on the key. We provide here simple …
[PDF][PDF] Making AES stronger: AES with key dependent S-box
GN Krishnamurthy, V Ramaswamy - IJCSNS International Journal of …, 2008 - Citeseer
With the fast evolution of digital data exchange, security information becomes much
important in data storage and transmission. In this paper, we show a new property of …
important in data storage and transmission. In this paper, we show a new property of …
SoK: 5 years of neural differential cryptanalysis
Abstract At CRYPTO 2019, A. Gohr introduced Neural Differential Cryptanalysis by applying
deep learning to modern block cipher cryptanalysis. Surprisingly, the resulting neural …
deep learning to modern block cipher cryptanalysis. Surprisingly, the resulting neural …
A generalization of algebraic expression for nonlinear component of symmetric key algorithms of any characteristic p
Recently several block ciphers are proposed which are based on the inversion map**
over binary Galois field with n-input. These proposed block ciphers are Camellia, AES …
over binary Galois field with n-input. These proposed block ciphers are Camellia, AES …
Ciphertext-only fault attacks on PRESENT
In this work, we introduce fault attacks on PRESENT with faulty ciphertexts-only. In contrast
to current differential fault attacks on PRESENT, which are mostly chosen-plaintext attacks …
to current differential fault attacks on PRESENT, which are mostly chosen-plaintext attacks …
Performance Comparison of Advanced Encryption Standard (AES) and AES key dependent S-box-Simulation using MATLAB
S Shivkumar, G Umamaheswari - … International Conference on …, 2011 - ieeexplore.ieee.org
The growing popularity of mobile and hand held devices ignited the growth of wireless
networks over the past years. Wireless data communications have transformed not only the …
networks over the past years. Wireless data communications have transformed not only the …
Attack resistant chaos-based cryptosystem by modified baker map and logistic map
D Chatterjee, BG Banik, A Banik - International Journal of …, 2023 - inderscienceonline.com
In this paper, a new substitution-diffusion type chaos-based cryptosystem is proposed, which
can encrypt greyscale images having arbitrary resolution. In substitution, image pixels are …
can encrypt greyscale images having arbitrary resolution. In substitution, image pixels are …