Cellular automata based S-boxes
Cellular Automata (CA) represent an interesting approach to design Substitution Boxes (S-
boxes) having good cryptographic properties and low implementation costs. From the …
boxes) having good cryptographic properties and low implementation costs. From the …
An external parameter independent novel cost function for evolving bijective substitution-boxes
A Freyre-Echevarría, A Alanezi, I Martínez-Díaz… - Symmetry, 2020 - mdpi.com
The property of nonlinearity has high importance for the design of strong substitution boxes.
Therefore, the development of new techniques to produce substitution boxes with high …
Therefore, the development of new techniques to produce substitution boxes with high …
Artificial intelligence for the design of symmetric cryptographic primitives
This chapter provides a general overview of AI methods used to support the design of
cryptographic primitives and protocols. After giving a brief introduction to the basic concepts …
cryptographic primitives and protocols. After giving a brief introduction to the basic concepts …
Chaos Meets Cryptography: Developing an S-Box Design with the Rössler Attractor
E Corona-Bermúdez, JC Chimal-Eguía… - Mathematics, 2023 - mdpi.com
The volume of data transmitted over networks has significantly increased in recent years. For
that reason, safeguarding the privacy, authenticity, and confidentiality of specific data is …
that reason, safeguarding the privacy, authenticity, and confidentiality of specific data is …
Insights gained after a decade of cellular automata-based cryptography
L Mariot - International Workshop on Cellular Automata and …, 2024 - Springer
Cellular Automata (CA) have been extensively used to implement symmetric cryptographic
primitives, such as pseudorandom number generators and S-boxes. However, most of the …
primitives, such as pseudorandom number generators and S-boxes. However, most of the …
Evolutionary algorithms for designing reversible cellular automata
Abstract Reversible Cellular Automata (RCA) are a particular kind of shift-invariant
transformations characterized by dynamics composed only of disjoint cycles. They have …
transformations characterized by dynamics composed only of disjoint cycles. They have …
Evolutionary computation and machine learning in security
S Picek, D Jakobovic - Proceedings of the Genetic and Evolutionary …, 2022 - dl.acm.org
Stjepan Picek received his PhD in 2015 as a double doctorate under the supervision of Lejla
Batina, Elena Marchiori (Radboud University Nijmegen, The Netherlands), and Domagoj …
Batina, Elena Marchiori (Radboud University Nijmegen, The Netherlands), and Domagoj …
Evolutionary computation and machine learning in cryptology
S Picek, D Jakobovic - Proceedings of the Genetic and Evolutionary …, 2021 - dl.acm.org
6 Attacks on Ciphers-ML 7 Quantum Protocols-EC 8 Physically Unclonable Functions-EC,
ML 9 Hardware Trojans-EC, ML 10 Side-channel Analysis-ML, EC 11 Fault Injection-EC, ML …
ML 9 Hardware Trojans-EC, ML 10 Side-channel Analysis-ML, EC 11 Fault Injection-EC, ML …
A characterisation of S-box fitness landscapes in cryptography
Substitution Boxes (S-boxes) are nonlinear objects often used in the design of cryptographic
algorithms. The design of high quality S-boxes is an interesting problem that attracts a lot of …
algorithms. The design of high quality S-boxes is an interesting problem that attracts a lot of …
Evolutionary algorithms for the design of quantum protocols
In this paper, we use evolutionary algorithm to evolve customized quantum key distribution
(QKD) protocols designed to counter attacks against the system in order to optimize the …
(QKD) protocols designed to counter attacks against the system in order to optimize the …