Results 241 to 250 of about 1,465,890 (271)
Some of the next articles are maybe not open access.
2006 IEEE 14th Signal Processing and Communications Applications, 2006
Nowadays, Linear redundancy has been identified in all S- boxes generated from finite field inversion and power mappings. That means it may be used in a new cryptanalytic attack in the future. In our study, we have developed an application to show that all output functions of an S-box are equivalent under an affine transformation of the input bits.
Sakalli, M. Tolga +3 more
openaire +2 more sources
Nowadays, Linear redundancy has been identified in all S- boxes generated from finite field inversion and power mappings. That means it may be used in a new cryptanalytic attack in the future. In our study, we have developed an application to show that all output functions of an S-box are equivalent under an affine transformation of the input bits.
Sakalli, M. Tolga +3 more
openaire +2 more sources
Cellular Automata-Based S-Boxes vs. DES S-Boxes
2009In the paper we use recently proposed cellular automata (CA) - based methodology [9] to design 6x4 S-boxes functionally equivalent to S-boxes used in current cryptographic standard known as DES. We provide an exhaustive experimental analysis of the proposed CA-based S-box in terms of non-linearity, autocorrelation, balance and strict avalanche ...
Miroslaw Szaban, Franciszek Seredynski
openaire +1 more source
2018
Substitution-Box (S-BOX) is the most critical block in the Advanced Encryption Standard (AES) algorithm, consumes 75% of total power during encryption. The primary idea to implement S-BOX is to have a unique byte substitution. In this paper 4 different architecture of SBOX discussed; (a) look-up table or ROM based S-BOX contains a pre-computed value ...
Abhishek Kumar, Sokat Tejani
openaire +1 more source
Substitution-Box (S-BOX) is the most critical block in the Advanced Encryption Standard (AES) algorithm, consumes 75% of total power during encryption. The primary idea to implement S-BOX is to have a unique byte substitution. In this paper 4 different architecture of SBOX discussed; (a) look-up table or ROM based S-BOX contains a pre-computed value ...
Abhishek Kumar, Sokat Tejani
openaire +1 more source
New Area Record for the AES Combined S-Box/Inverse S-Box
2018 IEEE 25th Symposium on Computer Arithmetic (ARITH), 2018The AES combined S-box/inverse S-box is a single construction that is shared between the encryption and decryption data paths of the AES. The currently most compact implementation of the AES combined S-box/inverse S-box is Canright's design, introduced back in 2005.
Arash Reyhani-Masoleh +2 more
openaire +1 more source
On the Algebraic Expression of the AES S-Box Like S-Boxes
2010In the literature, there are several proposed block ciphers like AES, Square, Shark and Hierocrypt which use S-boxes that are based on inversion mapping over a finite field. Because of the simple algebraic structure of S-boxes generated in this way, these ciphers usually use a bitwise affine transformation after the inversion mapping.
Sakallı, Muharrem Tolga +5 more
openaire +3 more sources
Improving quality of DES S-boxes by cellular automata-based S-boxes
The Journal of Supercomputing, 2010In the paper we use recently proposed cellular automata (CA) based methodology (Szaban and Seredynski in LNCS, vol. 5191, pp. 478---485, 2008) to design the 6×4 S-boxes functionally equivalent to S-boxes used in current cryptographic standard known as Data Encryption Standard (DES).
Miroslaw Szaban, Franciszek Seredynski
openaire +1 more source
Efficient implementations of S-box and inverse S-box for AES algorithm
TENCON 2009 - 2009 IEEE Region 10 Conference, 2009In this paper, improved architectures are proposed for implementation of S-Box and inverse S-Box needed in the Advanced encryption standard (AES) algorithm. These use combinational logic only for implementing SubByte (S-box) and InvSubByte (Inverse S-box).
Rashmi Ramesh Rachh +2 more
openaire +1 more source

