DEGENERATE S-BOXES

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Exponential S-boxes

Exponentiation in finite fields of characteristic 2 is proposed to construct large bijective S-boxes of block ciphers. We obtain some properties of the exponential Sboxes that are related to differential, higher order differential, and linear cryptanalysis methods.

متن کامل

DPA Attacks and S-Boxes

For the power consumption model called Hamming weight model, we rewrite DPA attacks in terms of correlation coefficients between two Boolean functions. We exhibit properties of S-boxes (also called (n, m)-functions) relied on DPA attacks. We show that these properties are opposite to the non-linearity criterion and to the propagation criterion. To quantify the resistance of an S-box to DPA atta...

متن کامل

The nonhomomorphicity of S-boxes

In this paper we introduce the concept of kth order nonho momorphicity of mappings or S boxes as an alternative indicator that forecasts nonlinearity characteristics of an S box where k is even Main results of this paper include we show that nonhomomorphicity especially the th order nonhomomorphicity can be precisely expressed by using other important nonlinear indicators of an S box we estab l...

متن کامل

Cellular Automata Based S-boxes

Cellular Automata (CA) represent an interesting approach to design Substitution Boxes (S-boxes) having good cryptographic properties and low implementation costs. From the cryptographic perspective, up to now there have been only ad-hoc studies about specific kinds of CA, the best known example being the χ nonlinear transformation used in Keccak. In this paper, we undertake a systematic investi...

متن کامل

Asymmetric cryptography with S-Boxes

In [12], T. Matsumoto and H. Imai designed an asymmetric cryptosystem, called C∗, for authentication, encryption and signature. This C∗ scheme was broken in [13] due to unexpected algebraic properties. In this paper, we study some new “candidate” asymmetric cryptosystems based on the idea of hiding one or two rounds of small S-box computations with secret functions of degree one or two. The pub...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Radio Electronics, Computer Science, Control

سال: 2018

ISSN: 2313-688X,1607-3274

DOI: 10.15588/1607-3274-2018-1-15