A tutorial on linear and differential cryptanalysis
HM Heys - Cryptologia, 2002 - Taylor & Francis
In this paper, we present a detailed tutorial on linear cryptanalysis and differential
cryptanalysis, the two most significant attacks applicable to symmetric-key block ciphers. The …
cryptanalysis, the two most significant attacks applicable to symmetric-key block ciphers. The …
Boolean Functions for Cryptography and Error-Correcting Codes.
C Carlet, Y Crama, PL Hammer - 2010 - books.google.com
A fundamental objective of cryptography is to enable two persons to communicate over an
insecure channel (a public channel such as the internet) in such a way that any other person …
insecure channel (a public channel such as the internet) in such a way that any other person …
Chaos and cryptography: block encryption ciphers based on chaotic maps
G Jakimoski, L Kocarev - … transactions on circuits and systems i …, 2001 - ieeexplore.ieee.org
This paper is devoted to the analysis of the impact of chaos-based techniques on block
encryption ciphers. We present several chaos based ciphers. Using the well-known …
encryption ciphers. We present several chaos based ciphers. Using the well-known …
An introduction to block cipher cryptanalysis
C De Canniere, A Biryukov… - Proceedings of the …, 2006 - ieeexplore.ieee.org
Since the introduction of the Data Encryption Standard (DES) in the mid-1970s, block
ciphers have played an ever-increasing role in cryptology. Because of the growing number …
ciphers have played an ever-increasing role in cryptology. Because of the growing number …
[PDF][PDF] The Khazad legacy-level block cipher
Khazad is a 64-bit (legacy-level) block cipher that accepts a 128-bit key. The cipher is a
uniform substitution-permutation network whose inverse only differs from the forward …
uniform substitution-permutation network whose inverse only differs from the forward …
MIBS: A new lightweight block cipher
M Izadi, B Sadeghiyan, SS Sadeghian… - … on Cryptology and …, 2009 - Springer
In this paper, we propose a new lightweight 64-bit block cipher, which we call MIBS, suitable
for resource-constrained devices, such as low-cost RFID tags. We also study its hardware …
for resource-constrained devices, such as low-cost RFID tags. We also study its hardware …
SEA: A scalable encryption algorithm for small embedded applications
FX Standaert, G Piret, N Gershenfeld… - Smart Card Research …, 2006 - Springer
Most present symmetric encryption algorithms result from a tradeoff between implementation
cost and resulting performances. In addition, they generally aim to be implemented …
cost and resulting performances. In addition, they generally aim to be implemented …
How far can we go beyond linear cryptanalysis?
Several generalizations of linear cryptanalysis have been proposed in the past, as well as
very similar attacks in a statistical point of view. In this paper, we define a rigorous general …
very similar attacks in a statistical point of view. In this paper, we define a rigorous general …
On multiple linear approximations
A Biryukov, C De Canniere, M Quisquater - Advances in Cryptology …, 2004 - Springer
In this paper we study the long standing problem of information extraction from multiple
linear approximations. We develop a formal statistical framework for block cipher attacks …
linear approximations. We develop a formal statistical framework for block cipher attacks …
S-box construction based on linear fractional transformation and permutation function
LC Nizam Chew, ES Ismail - Symmetry, 2020 - mdpi.com
Substitution boxes (S-box) with strong and secure cryptographic properties are widely used
for providing the key property of nonlinearity in block ciphers. This is critical to be resistant to …
for providing the key property of nonlinearity in block ciphers. This is critical to be resistant to …