The structured design of cryptographically good s-boxes
From MaRDI portal
Publication:923056
DOI10.1007/BF00203967zbMATH Open0711.94016OpenAlexW2065383271MaRDI QIDQ923056FDOQ923056
Authors: Carlisle M. Adams, Stafford E. Tavares
Publication date: 1990
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/bf00203967
Recommendations
- An STP-based model toward designing S-boxes with good cryptographic properties
- scientific article; zbMATH DE number 1024007
- scientific article; zbMATH DE number 4033662
- Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience
- Designing cryptographically strong \(S\)-boxes with the use of cellular automata
- Constructing S-boxes for lightweight cryptography with Feistel structure
- Designing cryptographically strong S-boxes with use of 1D cellular automata
nonlinearityBoolean functionsstrict avalanche criterions-boxes of private key crypto-systemssubstitution-permutation networks
Cites Work
- Communication Theory of Secrecy Systems*
- Title not available (Why is that?)
- Analysis and design of stream ciphers
- On ``bent functions
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Structured Design of Substitution-Permutation Encryption Networks
- Generating and counting binary bent sequences
- Title not available (Why is that?)
- Title not available (Why is that?)
Cited In (41)
- An STP-based model toward designing S-boxes with good cryptographic properties
- Designing cryptographically strong S-boxes with use of 1D cellular automata
- The method of S-box construction
- Title not available (Why is that?)
- Indices to measure the cryptographic strength of S-box
- Comparison of random S-box generation methods
- On weakly APN functions and 4-bit S-boxes
- The design of composite permutations with applications to DES-like S-boxes
- Application based construction and optimization of substitution boxes over 2D mixed chaotic maps
- Title not available (Why is that?)
- Light but tight: lightweight composition of serialized S-boxes with diffusion layers for strong ciphers
- An innovative design of substitution-boxes using cubic polynomial mapping
- An Expanded Set of S-box Design Criteria Based on Information Theory and its Relation to Differential-Like Attacks
- Algebraic nonlinearity and its applications to cryptography
- Reinventing the travois: encryption/MAC in 30 ROM bytes
- Cryptographic analysis of all \(4 \times 4\)-bit s-boxes
- Public key cryptosystems based on boolean permutations and their applications
- Title not available (Why is that?)
- A method for generation of high-nonlinear S-boxes based on gradient descent
- Title not available (Why is that?)
- Designing S-boxes based on 3-D four-wing autonomous chaotic system
- Title not available (Why is that?)
- A method for constructing bijective S-box with high nonlinearity based on chaos and optimization
- Differential cryptanalysis of image cipher using block-based scrambling and image filtering
- Wide Trail Design Strategy for Binary MixColumns
- An analysis of a class of algorithms for \(S\)-box construction
- Substitution-permutation networks resistant to differential and linear cryptanalysis
- On immunity against Biham and Shamir's differential cryptanalysis
- Design of new \(4\times 4\) S-box from finite commutative chain rings
- On complexity of round transformations
- Transform domain analysis of DES
- Methods and instruments for designing S-boxes
- Title not available (Why is that?)
- Fast S-box security mechanism research based on the polymorphic cipher
- On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure
- A method for designing dynamical S-boxes based on discretized chaotic map
- A novel method for designing S-boxes based on chaotic maps
- A novel method to design S-box based on chaotic map and genetic algorithm
- A New Design of Substitution Box with Ideal Strict Avalanche Criterion
- Title not available (Why is that?)
- Spectral-linear and spectral-differential methods for generating S-boxes having almost optimal cryptographic parameters
This page was built for publication: The structured design of cryptographically good s-boxes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q923056)