نتایج جستجو برای: strong s

تعداد نتایج: 1051003  

Journal: :J. UCS 1996
Xian-Mo Zhang Yuliang Zheng

Two signi cant recent advances in cryptanalysis, namely the di erential attack put forward by Biham and Shamir [BS91] and the linear attack by Matsui [Mat94a, Mat94b], have had devastating impact on data encryption algorithms. An eminent problem that researchers are facing is to design S-boxes or substitution boxes so that an encryption algorithm that employs the S-boxes is immune to the attack...

1994
Jennifer Seberry Xian-Mo Zhang Yuliang Zheng

Two signi cant recent advances in cryptanalysis namely the di erential attack put forward by Biham and Shamir and the linear attack by Matsui have had devastating impact on data encryption algorithms An eminent problem that researchers are facing is to design S boxes or substitution boxes so that an encryption algorithm that em ploys the S boxes is immune to the attacks In this paper we present...

Journal: :IACR Cryptology ePrint Archive 2012
Bodhisatwa Mazumdar Debdeep Mukhopadhyay Indranil Sengupta

Abstract. In FSE 2005, transparency order was proposed as a parameter for the robustness of S-boxes to Differential Power Analysis (DPA): lower transparency order implying more resistance. However most cryptographically strong Boolean functions have been found to have high transparency order. Also it is a difficult problem to search for Boolean functions which are strong cryptographically, and ...

1994
Jennifer Seberry Xian-Mo Zhang Yuliang Zheng

Two signi cant recent advances in cryptanalysis namely the di erential attack put for ward by Biham and Shamir and the linear attack by Matsui have had devastating impact on data encryption algorithms An eminent problem that researchers are facing is to design S boxes or substitution boxes so that an encryption algorithm that employs the S boxes is immune to the attacks In this paper we present...

Journal: :I. J. Network Security 2009
Jorge Nakahara

This paper analyses all 24 possible round constructions using different combinations of the four round components of the AES cipher: SubBytes, ShiftRows, AddRoundKey and MixColumns. We investigate how the different round orderings affect the security of AES against differential, linear, multiset, impossible differential and boomerang attacks. The cryptographic strenght of each cipher variant wa...

2008
Kenneth Kunen

Under the continuum hypothesis, there is a compact homogeneous strong S-space.

Journal: :IOP Conference Series: Materials Science and Engineering 2021

Journal: :Fundamenta Mathematicae 1997

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید