Results 11 to 20 of about 435,325 (313)
Generating Cryptographic S-Boxes Using the Reinforcement Learning
Substitution boxes (S-boxes) are essential components of many cryptographic primitives. The Dijkstra algorithm, SAT solvers, and heuristic methods have been used to find bitsliced implementations of S-boxes.
Giyoon Kim +4 more
doaj +1 more source
Bit permutations are efficient linear functions often used for lightweight cipher designs. However, they have low diffusion effects, compared to word-oriented binary and maximum distance separable (MDS) matrices.
Hangi Kim +10 more
doaj +1 more source
Periodicity Detection of the Substitution Box in the CBC Mode of Operation: Experiment and Study
This paper presents a technique for investigating the cyclic properties of substitution boxes (S-boxes) in the Cipher Block Chaining (CBC) mode of operation.
Zhanna Alimzhanova +2 more
doaj +1 more source
Threshold implementations of small S-boxes [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Bilgin, Begül +5 more
openaire +1 more source
On cryptographic properties of (n + 1)-bit S-boxes constructed by known n-bit S-boxes
S-box is the basic component of symmetric cryptographic algorithms, and its cryptographic properties play a key role in security of the algorithms.
Zhou Yu, Mu Daoguang, Dong Xinfeng
doaj +1 more source
A Novel Optimization Method for Constructing Cryptographically Strong Dynamic S-Boxes
The resistance of S-box-based cryptosystems to linear cryptanalysis is often determined by the nonlinearity (NL) and the linear approximation probability (LAP) of the underlying S-box.
Saleh Ibrahim, Alaa M. Abbas
doaj +1 more source
A Robust S Box Design Using Cyclic Groups and Image Encryption
Modern cryptographic systems use substitution boxes (S-boxes) throughout the encryption process to enhance the security of the plaintext. The integrity of the communication process is ensured by these S-boxes, which are vital in converting the ciphertext
Rashad Ali +4 more
doaj +1 more source
Biometric Data Protection [PDF]
Biometric recognition systems are clearly vulnerable to a variety of software- and model-based attacks that can compromise different stages of the authentication process.
Chemlal Abdelhakim +5 more
doaj +1 more source
Protection of data transmitted over the network from illegal access is one of the major challenges being posed by exponential growth of data in online digital communication. Modern cryptosystems assist in data sanctuary by utilizing substitution-boxes (S-
Amjad Hussain Zahid +6 more
doaj +1 more source
In this article, the authors present an efficient S-box generator respecting all criteria and more. Coppersmith’s design criteria served as a basis, but were strengthened for better resistance to linear cryptanalysis. While other researchers have already proposed S-box generators for DES satisfying either non-linearity or good diffusion, our generator ...
De Meyer, Lauren, Vaudenay, Serge
openaire +2 more sources

