A tutorial on linear and differential cryptanalysis

HM Heys - Cryptologia, 2002 - Taylor & Francis
In this paper, we present a detailed tutorial on linear cryptanalysis and differential
cryptanalysis, the two most significant attacks applicable to symmetric-key block ciphers. The …

Boolean Functions for Cryptography and Error-Correcting Codes.

C Carlet, Y Crama, PL Hammer - 2010 - books.google.com
A fundamental objective of cryptography is to enable two persons to communicate over an
insecure channel (a public channel such as the internet) in such a way that any other person …

Chaos and cryptography: block encryption ciphers based on chaotic maps

G Jakimoski, L Kocarev - … transactions on circuits and systems i …, 2001 - ieeexplore.ieee.org
This paper is devoted to the analysis of the impact of chaos-based techniques on block
encryption ciphers. We present several chaos based ciphers. Using the well-known …

An introduction to block cipher cryptanalysis

C De Canniere, A Biryukov… - Proceedings of the …, 2006 - ieeexplore.ieee.org
Since the introduction of the Data Encryption Standard (DES) in the mid-1970s, block
ciphers have played an ever-increasing role in cryptology. Because of the growing number …

[PDF][PDF] The Khazad legacy-level block cipher

P Barreto, V Rijmen - Primitive submitted to NESSIE, 2000 - researchgate.net
Khazad is a 64-bit (legacy-level) block cipher that accepts a 128-bit key. The cipher is a
uniform substitution-permutation network whose inverse only differs from the forward …

MIBS: A new lightweight block cipher

M Izadi, B Sadeghiyan, SS Sadeghian… - … on Cryptology and …, 2009 - Springer
In this paper, we propose a new lightweight 64-bit block cipher, which we call MIBS, suitable
for resource-constrained devices, such as low-cost RFID tags. We also study its hardware …

SEA: A scalable encryption algorithm for small embedded applications

FX Standaert, G Piret, N Gershenfeld… - Smart Card Research …, 2006 - Springer
Most present symmetric encryption algorithms result from a tradeoff between implementation
cost and resulting performances. In addition, they generally aim to be implemented …

How far can we go beyond linear cryptanalysis?

T Baigneres, P Junod, S Vaudenay - … on the Theory and Application of …, 2004 - Springer
Several generalizations of linear cryptanalysis have been proposed in the past, as well as
very similar attacks in a statistical point of view. In this paper, we define a rigorous general …

On multiple linear approximations

A Biryukov, C De Canniere, M Quisquater - Advances in Cryptology …, 2004 - Springer
In this paper we study the long standing problem of information extraction from multiple
linear approximations. We develop a formal statistical framework for block cipher attacks …

S-box construction based on linear fractional transformation and permutation function

LC Nizam Chew, ES Ismail - Symmetry, 2020 - mdpi.com
Substitution boxes (S-box) with strong and secure cryptographic properties are widely used
for providing the key property of nonlinearity in block ciphers. This is critical to be resistant to …