Cellular automata based S-boxes

L Mariot, S Picek, A Leporati, D Jakobovic - Cryptography and …, 2019 - Springer
Cellular Automata (CA) represent an interesting approach to design Substitution Boxes (S-
boxes) having good cryptographic properties and low implementation costs. From the …

An external parameter independent novel cost function for evolving bijective substitution-boxes

A Freyre-Echevarría, A Alanezi, I Martínez-Díaz… - Symmetry, 2020 - mdpi.com
The property of nonlinearity has high importance for the design of strong substitution boxes.
Therefore, the development of new techniques to produce substitution boxes with high …

Artificial intelligence for the design of symmetric cryptographic primitives

L Mariot, D Jakobovic, T Bäck… - Security and Artificial …, 2022 - Springer
This chapter provides a general overview of AI methods used to support the design of
cryptographic primitives and protocols. After giving a brief introduction to the basic concepts …

Chaos Meets Cryptography: Developing an S-Box Design with the Rössler Attractor

E Corona-Bermúdez, JC Chimal-Eguía… - Mathematics, 2023 - mdpi.com
The volume of data transmitted over networks has significantly increased in recent years. For
that reason, safeguarding the privacy, authenticity, and confidentiality of specific data is …

Insights gained after a decade of cellular automata-based cryptography

L Mariot - International Workshop on Cellular Automata and …, 2024 - Springer
Cellular Automata (CA) have been extensively used to implement symmetric cryptographic
primitives, such as pseudorandom number generators and S-boxes. However, most of the …

Evolutionary algorithms for designing reversible cellular automata

L Mariot, S Picek, D Jakobovic, A Leporati - Genetic Programming and …, 2021 - Springer
Abstract Reversible Cellular Automata (RCA) are a particular kind of shift-invariant
transformations characterized by dynamics composed only of disjoint cycles. They have …

Evolutionary computation and machine learning in security

S Picek, D Jakobovic - Proceedings of the Genetic and Evolutionary …, 2022 - dl.acm.org
Stjepan Picek received his PhD in 2015 as a double doctorate under the supervision of Lejla
Batina, Elena Marchiori (Radboud University Nijmegen, The Netherlands), and Domagoj …

Evolutionary computation and machine learning in cryptology

S Picek, D Jakobovic - Proceedings of the Genetic and Evolutionary …, 2021 - dl.acm.org
6 Attacks on Ciphers-ML 7 Quantum Protocols-EC 8 Physically Unclonable Functions-EC,
ML 9 Hardware Trojans-EC, ML 10 Side-channel Analysis-ML, EC 11 Fault Injection-EC, ML …

A characterisation of S-box fitness landscapes in cryptography

D Jakobovic, S Picek, MSR Martins… - Proceedings of the …, 2019 - dl.acm.org
Substitution Boxes (S-boxes) are nonlinear objects often used in the design of cryptographic
algorithms. The design of high quality S-boxes is an interesting problem that attracts a lot of …

Evolutionary algorithms for the design of quantum protocols

W Krawec, S Picek, D Jakobovic - … , EvoApplications 2019, Held as Part of …, 2019 - Springer
In this paper, we use evolutionary algorithm to evolve customized quantum key distribution
(QKD) protocols designed to counter attacks against the system in order to optimize the …