Results 11 to 20 of about 435,325 (313)

Generating Cryptographic S-Boxes Using the Reinforcement Learning

open access: yesIEEE Access, 2021
Substitution boxes (S-boxes) are essential components of many cryptographic primitives. The Dijkstra algorithm, SAT solvers, and heuristic methods have been used to find bitsliced implementations of S-boxes.
Giyoon Kim   +4 more
doaj   +1 more source

A New Method for Designing Lightweight S-Boxes With High Differential and Linear Branch Numbers, and its Application

open access: yesIEEE Access, 2021
Bit permutations are efficient linear functions often used for lightweight cipher designs. However, they have low diffusion effects, compared to word-oriented binary and maximum distance separable (MDS) matrices.
Hangi Kim   +10 more
doaj   +1 more source

Periodicity Detection of the Substitution Box in the CBC Mode of Operation: Experiment and Study

open access: yesIEEE Access, 2023
This paper presents a technique for investigating the cyclic properties of substitution boxes (S-boxes) in the Cipher Block Chaining (CBC) mode of operation.
Zhanna Alimzhanova   +2 more
doaj   +1 more source

Threshold implementations of small S-boxes [PDF]

open access: yesCryptography and Communications, 2014
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Bilgin, Begül   +5 more
openaire   +1 more source

On cryptographic properties of (n + 1)-bit S-boxes constructed by known n-bit S-boxes

open access: yesJournal of Mathematical Cryptology, 2020
S-box is the basic component of symmetric cryptographic algorithms, and its cryptographic properties play a key role in security of the algorithms.
Zhou Yu, Mu Daoguang, Dong Xinfeng
doaj   +1 more source

A Novel Optimization Method for Constructing Cryptographically Strong Dynamic S-Boxes

open access: yesIEEE Access, 2020
The resistance of S-box-based cryptosystems to linear cryptanalysis is often determined by the nonlinearity (NL) and the linear approximation probability (LAP) of the underlying S-box.
Saleh Ibrahim, Alaa M. Abbas
doaj   +1 more source

A Robust S Box Design Using Cyclic Groups and Image Encryption

open access: yesIEEE Access, 2023
Modern cryptographic systems use substitution boxes (S-boxes) throughout the encryption process to enhance the security of the plaintext. The integrity of the communication process is ensured by these S-boxes, which are vital in converting the ciphertext
Rashad Ali   +4 more
doaj   +1 more source

Biometric Data Protection [PDF]

open access: yesE3S Web of Conferences
Biometric recognition systems are clearly vulnerable to a variety of software- and model-based attacks that can compromise different stages of the authentication process.
Chemlal Abdelhakim   +5 more
doaj   +1 more source

Efficient Dynamic S-Box Generation Using Linear Trigonometric Transformation for Security Applications

open access: yesIEEE Access, 2021
Protection of data transmitted over the network from illegal access is one of the major challenges being posed by exponential growth of data in online digital communication. Modern cryptosystems assist in data sanctuary by utilizing substitution-boxes (S-
Amjad Hussain Zahid   +6 more
doaj   +1 more source

DES S-box generator [PDF]

open access: yesCryptologia, 2016
In this article, the authors present an efficient S-box generator respecting all criteria and more. Coppersmith’s design criteria served as a basis, but were strengthened for better resistance to linear cryptanalysis. While other researchers have already proposed S-box generators for DES satisfying either non-linearity or good diffusion, our generator ...
De Meyer, Lauren, Vaudenay, Serge
openaire   +2 more sources

Home - About - Disclaimer - Privacy