Boolean functions for cryptography and coding theory
C Carlet - 2021 - books.google.com
Boolean functions are essential to systems for secure and reliable communication. This
comprehensive survey of Boolean functions for cryptography and coding covers the whole …
comprehensive survey of Boolean functions for cryptography and coding covers the whole …
A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field
N Siddiqui, F Yousaf, F Murtaza, M Ehatisham-ul-Haq… - Plos one, 2020 - journals.plos.org
Cryptography is commonly used to secure communication and data transmission over
insecure networks through the use of cryptosystems. A cryptosystem is a set of cryptographic …
insecure networks through the use of cryptosystems. A cryptosystem is a set of cryptographic …
A novel construction of efficient substitution-boxes using cubic fractional transformation
A symmetric block cipher employing a substitution–permutation duo is an effective technique
for the provision of information security. For substitution, modern block ciphers use one or …
for the provision of information security. For substitution, modern block ciphers use one or …
[HTML][HTML] A substitution box for lightweight ciphers to secure internet of things
V Panchami, MM Mathews - Journal of King Saud University-Computer and …, 2023 - Elsevier
Abstract The Internet of Things is a resource-constrained device that demands lightweight
cryptographic solutions to achieve high performance and optimal security. In lightweight …
cryptographic solutions to achieve high performance and optimal security. In lightweight …
[HTML][HTML] A novel 5-bit S-box design for lightweight cryptography algorithms
VA Thakor, MA Razzaque, AD Darji, AR Patel - Journal of Information …, 2023 - Elsevier
Cryptography is one of the techniques to secure communication and data transfer over the
network. It performs well on resource-rich devices (PC, servers, smartphones, etc.) …
network. It performs well on resource-rich devices (PC, servers, smartphones, etc.) …
Cellular automata based S-boxes
Cellular Automata (CA) represent an interesting approach to design Substitution Boxes (S-
boxes) having good cryptographic properties and low implementation costs. From the …
boxes) having good cryptographic properties and low implementation costs. From the …
Design of a strong S-box based on a matrix approach
JA Aboytes-González, JS Murguía, M Mejía-Carlos… - Nonlinear …, 2018 - Springer
In this paper, we present a matrix approach based on the rule 90 cellular automata, and a
fractional linear transformation over Galois field GF (2^ 8) GF (2 8), to implement a strong …
fractional linear transformation over Galois field GF (2^ 8) GF (2 8), to implement a strong …
An external parameter independent novel cost function for evolving bijective substitution-boxes
A Freyre-Echevarría, A Alanezi, I Martínez-Díaz… - Symmetry, 2020 - mdpi.com
The property of nonlinearity has high importance for the design of strong substitution boxes.
Therefore, the development of new techniques to produce substitution boxes with high …
Therefore, the development of new techniques to produce substitution boxes with high …
Algorithm for generating s-boxes with prescribed differential properties
S Marochok, P Zajac - Algorithms, 2023 - mdpi.com
Cryptographic S-boxes are vectorial Boolean functions that must fulfill strict criteria to
provide security for cryptographic algorithms. There are several existing methods for …
provide security for cryptographic algorithms. There are several existing methods for …
A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map
A Ali, MA Khan, RK Ayyasamy, M Wasif - PeerJ Computer Science, 2022 - peerj.com
Cryptography deals with designing practical mathematical algorithms having the two
primitive elements of confusion and diffusion. The security of encrypted data is highly …
primitive elements of confusion and diffusion. The security of encrypted data is highly …