Results 11 to 20 of about 1,483,203 (289)

Matrix Power S-box Analysis [PDF]

open access: yes, 2008
* Work supported by the Lithuanian State Science and Studies Foundation. Construction of symmetric cipher S-box based on matrix power function and dependant on key is analyzed. The matrix consisting of plain data bit strings is combined with three round key matrices using arithmetical addition and exponent operations.
Luksys, Kestutis, Nefas, Petras
openaire   +3 more sources

STUDY OF THE CRYPTOGRAPHIC STRENGTH OF THE S-BOX OBTAINED ON THE BASIS OF EXPONENTIATION MODULO

open access: yesScientific Journal of Astana IT University, 2022
This article presents one of the main transformations of symmetric block ciphers used to protect confidential information, a new method for obtaining a non-linear S block, and an analysis of the results obtained.
Ardabek Khompysh   +3 more
doaj   +1 more source

Enhancement of Non-Permutation Binomial Power Functions to Construct Cryptographically Strong S-Boxes

open access: yesMathematics, 2023
A Substitution box (S-box) is an important component used in symmetric key cryptosystems to satisfy Shannon’s property on confusion. As the only nonlinear operation, the S-box must be cryptographically strong to thwart any cryptanalysis tools on ...
Herman Isa   +5 more
doaj   +1 more source

The influence of S-boxes on the arrival of the cipher to the state of random substitution

open access: yesРадіоелектронні і комп'ютерні системи, 2023
The subject of this study is the process of developing block symmetric ciphers with improved cryptographic stability indicators for solving the problems of information protection in information and communication systems.
Iryna Lysytska   +3 more
doaj   +1 more source

Reconfigurable Research and Circuit Design of Two Types of Nonlinear Cryptographic Components [PDF]

open access: yesJisuanji gongcheng, 2022
During the implementation of a cryptographic processor, considerable resources are wasted because of the isomerization of the S box and the Non-linear Boolean Function(NBF) in its symmetric cipher.A reconfigurable circuit structure of an AES-like S box ...
LIAN Yixin, CHEN Tao, LI Wei, NAN Longmei
doaj   +1 more source

A Novel Construction of Perfect Strict Avalanche Criterion S-box using Simple Irreducible Polynomials

open access: yesScientific Journal of Informatics, 2020
An irreducible polynomial is one of the main components in building an S-box with an algebraic technique approach. The selection of the precise irreducible polynomial will determine the quality of the S-box produced. One method for determining good S-box
Alamsyah Alamsyah
doaj   +1 more source

Example of internal function for Sponge scheme built on the basis of the generalized AES design methodology

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2021
The purpose of this article is to construct an internal function underlying the “Sponge” scheme for constructing  cryptographic  hash  functions.  An  internal  function in  the  “Sponge”  scheme  is  a  fixed-length transformation  or  permutation  that 
R. M. Ospanov   +3 more
doaj   +1 more source

FPGA implementation of hardware architecture with AES encryptor using sub-pipelined S-box techniques for compact applications

open access: yesAutomatika, 2020
Advanced Encryption Standard (AES) is a thriving cryptographic algorithm that can be utilized to guarantee security in electronic information. It remains to uphold to be resistive from most of the attacks.
C. Arul Murugan   +2 more
doaj   +1 more source

The SPN Network for Digital Audio Data Based on Elliptic Curve Over a Finite Field

open access: yesIEEE Access, 2022
The mathematical operation of the Elliptic Curve over the prime finite field is wildly used for secure data communication as it provides high security while utilizing the same size as the secret key.
Ijaz Khalid   +5 more
doaj   +1 more source

Threshold implementations of small S-boxes [PDF]

open access: yesCryptography and Communications, 2014
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Bilgin, Begül   +5 more
openaire   +1 more source

Home - About - Disclaimer - Privacy