Cryptographic Analysis of All 4 × 4-Bit S-Boxes
From MaRDI portal
Publication:2889866
DOI10.1007/978-3-642-28496-0_7zbMath1292.94132OpenAlexW112080296MaRDI QIDQ2889866
Publication date: 8 June 2012
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-28496-0_7
Related Items (17)
Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions ⋮ Unnamed Item ⋮ Enabling 3-Share Threshold Implementations for all 4-Bit S-Boxes ⋮ On the relationship between resilient Boolean functions and linear branch number of S-boxes ⋮ Related-Key Attacks Against Full Hummingbird-2 ⋮ A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox ⋮ Threshold implementations of small S-boxes ⋮ On weakly APN functions and 4-bit S-boxes ⋮ RAMus- a new lightweight block cipher for RAM encryption ⋮ An efficient affine equivalence algorithm for multiple S-boxes and a structured affine layer ⋮ On the construction of \(20 \times 20\) and \(2 4 \times 24\) binary matrices with good implementation properties for lightweight block ciphers and hash functions ⋮ Unnamed Item ⋮ Multiplicative complexity of bijective \(4\times 4\) \(S\)-boxes ⋮ Cryptographic properties of small bijective S-boxes with respect to modular addition ⋮ Design of fault-resilient S-boxes for AES-like block ciphers ⋮ $\otimes_{\mathbf{W}}$-марковость XSL-алгоритмов блочного шифрования, связанная со свойствами слоев раундовой функции ⋮ A Search Strategy to Optimize the Affine Variant Properties of S-Boxes
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- The structured design of cryptographically good s-boxes
- Multiple Differential Cryptanalysis: Theory and Practice
- A Feebly Secure Trapdoor Function
- PRESENT: An Ultra-Lightweight Block Cipher
- Cube Attacks on Tweakable Black Box Polynomials
- Communication Theory of Secrecy Systems*
- The Data Encryption Standard (DES) and its strength against attacks
- Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
- A fast new DES implementation in software
- Dependent Linear Approximations: The Algorithm of Biryukov and Others Revisited
- Advances in Cryptology – CRYPTO 2004
- On the Classification of 4 Bit S-Boxes
- Fast Software Encryption
This page was built for publication: Cryptographic Analysis of All 4 × 4-Bit S-Boxes