Results 11 to 20 of about 1,465,890 (271)

Matrix Power S-box Analysis [PDF]

open access: yes, 2008
* Work supported by the Lithuanian State Science and Studies Foundation. Construction of symmetric cipher S-box based on matrix power function and dependant on key is analyzed. The matrix consisting of plain data bit strings is combined with three round key matrices using arithmetical addition and exponent operations.
Luksys, Kestutis, Nefas, Petras
openaire   +3 more sources

The SPN Network for Digital Audio Data Based on Elliptic Curve Over a Finite Field

open access: yesIEEE Access, 2022
The mathematical operation of the Elliptic Curve over the prime finite field is wildly used for secure data communication as it provides high security while utilizing the same size as the secret key.
Ijaz Khalid   +5 more
doaj   +1 more source

Reconfigurable Research and Circuit Design of Two Types of Nonlinear Cryptographic Components [PDF]

open access: yesJisuanji gongcheng, 2022
During the implementation of a cryptographic processor, considerable resources are wasted because of the isomerization of the S box and the Non-linear Boolean Function(NBF) in its symmetric cipher.A reconfigurable circuit structure of an AES-like S box ...
LIAN Yixin, CHEN Tao, LI Wei, NAN Longmei
doaj   +1 more source

A Novel Construction of Perfect Strict Avalanche Criterion S-box using Simple Irreducible Polynomials

open access: yesScientific Journal of Informatics, 2020
An irreducible polynomial is one of the main components in building an S-box with an algebraic technique approach. The selection of the precise irreducible polynomial will determine the quality of the S-box produced. One method for determining good S-box
Alamsyah Alamsyah
doaj   +1 more source

FPGA implementation of hardware architecture with AES encryptor using sub-pipelined S-box techniques for compact applications

open access: yesAutomatika, 2020
Advanced Encryption Standard (AES) is a thriving cryptographic algorithm that can be utilized to guarantee security in electronic information. It remains to uphold to be resistive from most of the attacks.
C. Arul Murugan   +2 more
doaj   +1 more source

Threshold implementations of small S-boxes [PDF]

open access: yesCryptography and Communications, 2014
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Bilgin, Begül   +5 more
openaire   +1 more source

STUDY OF THE CRYPTOGRAPHIC STRENGTH OF THE S-BOX OBTAINED ON THE BASIS OF EXPONENTIATION MODULO

open access: yesScientific Journal of Astana IT University, 2022
This article presents one of the main transformations of symmetric block ciphers used to protect confidential information, a new method for obtaining a non-linear S block, and an analysis of the results obtained.
Ardabek Khompysh   +3 more
doaj   +1 more source

Enhancement of Non-Permutation Binomial Power Functions to Construct Cryptographically Strong S-Boxes

open access: yesMathematics, 2023
A Substitution box (S-box) is an important component used in symmetric key cryptosystems to satisfy Shannon’s property on confusion. As the only nonlinear operation, the S-box must be cryptographically strong to thwart any cryptanalysis tools on ...
Herman Isa   +5 more
doaj   +1 more source

Construction of Side Channel Attack Resistant S-Boxes Using Genetic Algorithms Based on Coordinate Functions [PDF]

open access: yesJournal of Electrical and Computer Engineering Innovations, 2022
Background and Objectives: Substitution-box (S-Box) is one of the essential components creating confusion and nonlinear properties in cryptography. To strengthen a cipher against various attacks, including side channel attacks, these boxes need to have ...
B. Khadem, S. Rajavzadeh
doaj   +1 more source

Image encryption based on s-box and 3D-chaotic maps and secure image transmission through ofdm in rayleigh fading channel [PDF]

open access: yesEngineering and Technology Journal
Data security is vital if transferred over a wireless network or stored on a personal computer. The essential properties of chaos, such as initial state sensitivity and unpredictability, make it a crucial candidate for encryption applications. This paper
Jenan Namuq, Fadhil Hasan, Alaa Ali
doaj   +1 more source

Home - About - Disclaimer - Privacy