Results 11 to 20 of about 1,465,890 (271)
Matrix Power S-box Analysis [PDF]
* Work supported by the Lithuanian State Science and Studies Foundation. Construction of symmetric cipher S-box based on matrix power function and dependant on key is analyzed. The matrix consisting of plain data bit strings is combined with three round key matrices using arithmetical addition and exponent operations.
Luksys, Kestutis, Nefas, Petras
openaire +3 more sources
The SPN Network for Digital Audio Data Based on Elliptic Curve Over a Finite Field
The mathematical operation of the Elliptic Curve over the prime finite field is wildly used for secure data communication as it provides high security while utilizing the same size as the secret key.
Ijaz Khalid +5 more
doaj +1 more source
Reconfigurable Research and Circuit Design of Two Types of Nonlinear Cryptographic Components [PDF]
During the implementation of a cryptographic processor, considerable resources are wasted because of the isomerization of the S box and the Non-linear Boolean Function(NBF) in its symmetric cipher.A reconfigurable circuit structure of an AES-like S box ...
LIAN Yixin, CHEN Tao, LI Wei, NAN Longmei
doaj +1 more source
An irreducible polynomial is one of the main components in building an S-box with an algebraic technique approach. The selection of the precise irreducible polynomial will determine the quality of the S-box produced. One method for determining good S-box
Alamsyah Alamsyah
doaj +1 more source
Advanced Encryption Standard (AES) is a thriving cryptographic algorithm that can be utilized to guarantee security in electronic information. It remains to uphold to be resistive from most of the attacks.
C. Arul Murugan +2 more
doaj +1 more source
Threshold implementations of small S-boxes [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Bilgin, Begül +5 more
openaire +1 more source
STUDY OF THE CRYPTOGRAPHIC STRENGTH OF THE S-BOX OBTAINED ON THE BASIS OF EXPONENTIATION MODULO
This article presents one of the main transformations of symmetric block ciphers used to protect confidential information, a new method for obtaining a non-linear S block, and an analysis of the results obtained.
Ardabek Khompysh +3 more
doaj +1 more source
A Substitution box (S-box) is an important component used in symmetric key cryptosystems to satisfy Shannon’s property on confusion. As the only nonlinear operation, the S-box must be cryptographically strong to thwart any cryptanalysis tools on ...
Herman Isa +5 more
doaj +1 more source
Construction of Side Channel Attack Resistant S-Boxes Using Genetic Algorithms Based on Coordinate Functions [PDF]
Background and Objectives: Substitution-box (S-Box) is one of the essential components creating confusion and nonlinear properties in cryptography. To strengthen a cipher against various attacks, including side channel attacks, these boxes need to have ...
B. Khadem, S. Rajavzadeh
doaj +1 more source
Image encryption based on s-box and 3D-chaotic maps and secure image transmission through ofdm in rayleigh fading channel [PDF]
Data security is vital if transferred over a wireless network or stored on a personal computer. The essential properties of chaos, such as initial state sensitivity and unpredictability, make it a crucial candidate for encryption applications. This paper
Jenan Namuq, Fadhil Hasan, Alaa Ali
doaj +1 more source

