Results 241 to 250 of about 1,483,203 (289)
Some of the next articles are maybe not open access.

Related searches:

Affine Equivalence in S-boxes

2006 IEEE 14th Signal Processing and Communications Applications, 2006
Nowadays, Linear redundancy has been identified in all S- boxes generated from finite field inversion and power mappings. That means it may be used in a new cryptanalytic attack in the future. In our study, we have developed an application to show that all output functions of an S-box are equivalent under an affine transformation of the input bits.
Sakalli, M. Tolga   +3 more
openaire   +2 more sources

Cellular Automata-Based S-Boxes vs. DES S-Boxes

2009
In the paper we use recently proposed cellular automata (CA) - based methodology [9] to design 6x4 S-boxes functionally equivalent to S-boxes used in current cryptographic standard known as DES. We provide an exhaustive experimental analysis of the proposed CA-based S-box in terms of non-linearity, autocorrelation, balance and strict avalanche ...
Miroslaw Szaban, Franciszek Seredynski
openaire   +1 more source

S-BOX Architecture

2018
Substitution-Box (S-BOX) is the most critical block in the Advanced Encryption Standard (AES) algorithm, consumes 75% of total power during encryption. The primary idea to implement S-BOX is to have a unique byte substitution. In this paper 4 different architecture of SBOX discussed; (a) look-up table or ROM based S-BOX contains a pre-computed value ...
Abhishek Kumar, Sokat Tejani
openaire   +1 more source

New Area Record for the AES Combined S-Box/Inverse S-Box

2018 IEEE 25th Symposium on Computer Arithmetic (ARITH), 2018
The AES combined S-box/inverse S-box is a single construction that is shared between the encryption and decryption data paths of the AES. The currently most compact implementation of the AES combined S-box/inverse S-box is Canright's design, introduced back in 2005.
Arash Reyhani-Masoleh   +2 more
openaire   +1 more source

On the Algebraic Expression of the AES S-Box Like S-Boxes

2010
In the literature, there are several proposed block ciphers like AES, Square, Shark and Hierocrypt which use S-boxes that are based on inversion mapping over a finite field. Because of the simple algebraic structure of S-boxes generated in this way, these ciphers usually use a bitwise affine transformation after the inversion mapping.
Sakallı, Muharrem Tolga   +5 more
openaire   +3 more sources

Improving quality of DES S-boxes by cellular automata-based S-boxes

The Journal of Supercomputing, 2010
In the paper we use recently proposed cellular automata (CA) based methodology (Szaban and Seredynski in LNCS, vol. 5191, pp. 478---485, 2008) to design the 6×4 S-boxes functionally equivalent to S-boxes used in current cryptographic standard known as Data Encryption Standard (DES).
Miroslaw Szaban, Franciszek Seredynski
openaire   +1 more source

Efficient implementations of S-box and inverse S-box for AES algorithm

TENCON 2009 - 2009 IEEE Region 10 Conference, 2009
In this paper, improved architectures are proposed for implementation of S-Box and inverse S-Box needed in the Advanced encryption standard (AES) algorithm. These use combinational logic only for implementing SubByte (S-box) and InvSubByte (Inverse S-box).
Rashmi Ramesh Rachh   +2 more
openaire   +1 more source

S-Box Design

2020
Substitution boxes are central to symmetric ciphers. Many introductory cryptography books do not provide adequate coverage of this topic, in many cases no coverage at all. This is unfortunate, as s-boxes provide the primary source of nonlinearity in many symmetric ciphers.
openaire   +1 more source

Home - About - Disclaimer - Privacy