Asymmetric Cryptography with S-Boxes -- It is easier than expected to . . .

نویسنده

  • Louis Goubin
چکیده

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Cost Function for Evolution of S-Boxes

Substitution Boxes (S-Boxes) play an important role in many modern-day cryptographic algorithms, more commonly known as ciphers. Without carefully chosen S-Boxes, such ciphers would be easier to break. Therefore, it is not surprising that the design of suitable S-Boxes attracts a lot of attention in the cryptography community. The evolutionary computation (EC) community also had several attempt...

متن کامل

The Impact of Asymmetric Risk on Expected Return

The main goal of the present study is testing asymmetric risk pricing and comparing it with pricing of traditional risk measures in Tehran Stock Market. Accordingly, a sample consisting of 101 companies listed in Tehran Stock Market during 2002-2013 went under investigation. In order to test asymmetric risk pricing, regression model of panel data was applied. The results revealed a positive and...

متن کامل

Improved Slide Attacks

The slide attack is applicable to ciphers that can be represented as an iterative application of the same keyed permutation. The slide attack leverages simple attacks on the keyed permutation to more complicated (and time consuming) attacks on the entire cipher. In this paper we extend the slide attack by examining the cycle structures of the entire cipher and of the underlying keyed permutatio...

متن کامل

Application of the Composite Field in the Design of an Improved AES S-box Based on Inversion

The hardware implementation of the Substitution-Box (S-box) of the Advanced Encryption Standard (AES) always employs composite field GF ((2)) to obtain better efficiency. In this paper, an improved class of S-boxes by direct inversion in composite field is presented, and the choice of the subfield leading to the most efficient implementation is discussed. Eliminating the field isomorphic transf...

متن کامل

Designing cryptographically strong S-boxes with the use of cellular automata

Block ciphers are widely used in modern cryptography. Substitution boxes (S–boxes) are main elements of these types of ciphers. In this paper we propose a new method to create S–boxes, which is based on application of Cellular Automata (CA). We present the results of testing CA-based S–boxes. These results confirm that CA are able to realize efficiently the Boolean function corresponding to cla...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997