Results 251 to 260 of about 1,465,890 (271)
Some of the next articles are maybe not open access.
2020
Substitution boxes are central to symmetric ciphers. Many introductory cryptography books do not provide adequate coverage of this topic, in many cases no coverage at all. This is unfortunate, as s-boxes provide the primary source of nonlinearity in many symmetric ciphers.
openaire +1 more source
Substitution boxes are central to symmetric ciphers. Many introductory cryptography books do not provide adequate coverage of this topic, in many cases no coverage at all. This is unfortunate, as s-boxes provide the primary source of nonlinearity in many symmetric ciphers.
openaire +1 more source
2009 Global Information Infrastructure Symposium, 2009
The substitution table or S-Box is considered as the core of the block ciphers. The good design of the S-Box can increase the cipher security and simplicity.
Ghada Zaibi +3 more
openaire +1 more source
The substitution table or S-Box is considered as the core of the block ciphers. The good design of the S-Box can increase the cipher security and simplicity.
Ghada Zaibi +3 more
openaire +1 more source
2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), 2012
Resource efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID (Radio-Frequency IDentification) tags and sensor nodes. Among those primitives, lightweight block cipher plays a major role to secure RFID's tag. One of the common lightweight block ciphers is PRESENT.
Sufyan Salim Mahmood Aldabbagh +1 more
openaire +1 more source
Resource efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID (Radio-Frequency IDentification) tags and sensor nodes. Among those primitives, lightweight block cipher plays a major role to secure RFID's tag. One of the common lightweight block ciphers is PRESENT.
Sufyan Salim Mahmood Aldabbagh +1 more
openaire +1 more source
0.18um CMOS Technology in Implementation of S Box and a Modified S Box
2011Cryptographic algorithms are the most essential elements in designing the system security. Though there are numerous encryption systems used in security systems by various organizations, for the wider use, a particular encryption method is used as a standard. The internationally accepted and acclaimed algorithm is Advanced Encryption Standard.
K. Rahimunnisa +2 more
openaire +1 more source
Key-Dependent S-Boxes and Differential Cryptanalysis
Designs, Codes and Cryptography, 2002zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Murphy, S., Robshaw, M. J. B.
openaire +2 more sources
Multi-objective optimisation of bijective s-boxes
New Generation Computing, 2005zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Fuller, Joanne +2 more
openaire +2 more sources
1983
Various probabilities of accidental linearities occurring in a random, reversible substitution lookup table (S-box) with m address and m contents bits are calculated. These probabilities decrease very dramatically with Increasing m. It is conjectured that good S-boxes may be built by choosing a random, reversible table of sufficient size.
J A Gordon, H Retkin
openaire +1 more source
Various probabilities of accidental linearities occurring in a random, reversible substitution lookup table (S-box) with m address and m contents bits are calculated. These probabilities decrease very dramatically with Increasing m. It is conjectured that good S-boxes may be built by choosing a random, reversible table of sufficient size.
J A Gordon, H Retkin
openaire +1 more source
Cellular automata based S-boxes
Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences, 2019Cellular Automata (CA) represent an interesting approach to design Substitution Boxes (S-boxes) having good cryptographic properties and low implementation costs. From the cryptographic perspective, up to now there have been only ad- hoc studies about specific kinds of CA, the best known example being the χ nonlinear transformation used in Keccak.
Jakobović, Domagoj, Picek, Stjepan
openaire
Generation of 8 × 8 S-boxes using 4 × 4 optimal S-boxes
International Journal of Information and Computer Security, 2023Vikas Tiwari +3 more
openaire +1 more source

