Results 291 to 300 of about 435,325 (313)
Some of the next articles are maybe not open access.
Improving quality of DES S-boxes by cellular automata-based S-boxes
The Journal of Supercomputing, 2010In the paper we use recently proposed cellular automata (CA) based methodology (Szaban and Seredynski in LNCS, vol. 5191, pp. 478---485, 2008) to design the 6×4 S-boxes functionally equivalent to S-boxes used in current cryptographic standard known as Data Encryption Standard (DES).
Miroslaw Szaban, Franciszek Seredynski
openaire +1 more source
Efficient implementations of S-box and inverse S-box for AES algorithm
TENCON 2009 - 2009 IEEE Region 10 Conference, 2009In this paper, improved architectures are proposed for implementation of S-Box and inverse S-Box needed in the Advanced encryption standard (AES) algorithm. These use combinational logic only for implementing SubByte (S-box) and InvSubByte (Inverse S-box).
Rashmi Ramesh Rachh +2 more
openaire +1 more source
2020
Substitution boxes are central to symmetric ciphers. Many introductory cryptography books do not provide adequate coverage of this topic, in many cases no coverage at all. This is unfortunate, as s-boxes provide the primary source of nonlinearity in many symmetric ciphers.
openaire +1 more source
Substitution boxes are central to symmetric ciphers. Many introductory cryptography books do not provide adequate coverage of this topic, in many cases no coverage at all. This is unfortunate, as s-boxes provide the primary source of nonlinearity in many symmetric ciphers.
openaire +1 more source
2009 Global Information Infrastructure Symposium, 2009
The substitution table or S-Box is considered as the core of the block ciphers. The good design of the S-Box can increase the cipher security and simplicity.
Ghada Zaibi +3 more
openaire +1 more source
The substitution table or S-Box is considered as the core of the block ciphers. The good design of the S-Box can increase the cipher security and simplicity.
Ghada Zaibi +3 more
openaire +1 more source
2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), 2012
Resource efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID (Radio-Frequency IDentification) tags and sensor nodes. Among those primitives, lightweight block cipher plays a major role to secure RFID's tag. One of the common lightweight block ciphers is PRESENT.
Sufyan Salim Mahmood Aldabbagh +1 more
openaire +1 more source
Resource efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID (Radio-Frequency IDentification) tags and sensor nodes. Among those primitives, lightweight block cipher plays a major role to secure RFID's tag. One of the common lightweight block ciphers is PRESENT.
Sufyan Salim Mahmood Aldabbagh +1 more
openaire +1 more source
0.18um CMOS Technology in Implementation of S Box and a Modified S Box
2011Cryptographic algorithms are the most essential elements in designing the system security. Though there are numerous encryption systems used in security systems by various organizations, for the wider use, a particular encryption method is used as a standard. The internationally accepted and acclaimed algorithm is Advanced Encryption Standard.
K. Rahimunnisa +2 more
openaire +1 more source
Key-Dependent S-Boxes and Differential Cryptanalysis
Designs, Codes and Cryptography, 2002zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Murphy, S., Robshaw, M. J. B.
openaire +2 more sources
Multi-objective optimisation of bijective s-boxes
New Generation Computing, 2005zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Fuller, Joanne +2 more
openaire +2 more sources
1983
Various probabilities of accidental linearities occurring in a random, reversible substitution lookup table (S-box) with m address and m contents bits are calculated. These probabilities decrease very dramatically with Increasing m. It is conjectured that good S-boxes may be built by choosing a random, reversible table of sufficient size.
J A Gordon, H Retkin
openaire +1 more source
Various probabilities of accidental linearities occurring in a random, reversible substitution lookup table (S-box) with m address and m contents bits are calculated. These probabilities decrease very dramatically with Increasing m. It is conjectured that good S-boxes may be built by choosing a random, reversible table of sufficient size.
J A Gordon, H Retkin
openaire +1 more source
Cellular automata based S-boxes
Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences, 2019Cellular Automata (CA) represent an interesting approach to design Substitution Boxes (S-boxes) having good cryptographic properties and low implementation costs. From the cryptographic perspective, up to now there have been only ad- hoc studies about specific kinds of CA, the best known example being the χ nonlinear transformation used in Keccak.
Jakobović, Domagoj, Picek, Stjepan
openaire

