[HTML][HTML] A substitution box for lightweight ciphers to secure internet of things

V Panchami, MM Mathews - Journal of King Saud University-Computer and …, 2023 - Elsevier
Abstract The Internet of Things is a resource-constrained device that demands lightweight
cryptographic solutions to achieve high performance and optimal security. In lightweight …

A new cost function for evolution of s-boxes

S Picek, M Cupic, L Rotim - Evolutionary computation, 2016 - ieeexplore.ieee.org
Substitution Boxes (S-Boxes) play an important role in many modern-day cryptographic
algorithms, more commonly known as ciphers. Without carefully chosen S-Boxes, such …

Evolving nonlinear S-boxes with improved theoretical resilience to power attacks

A Freyre-Echevarría, I Martínez-Díaz, CML Pérez… - IEEE …, 2020 - ieeexplore.ieee.org
Substitution boxes are the main nonlinear component of block ciphers. The security of these
ciphers against linear, differential, or side-channel attacks is dependent on the design of …

Confused by confusion: Systematic evaluation of DPA resistance of various s-boxes

S Picek, K Papagiannopoulos, B Ege, L Batina… - … on Cryptology in India, 2014 - Springer
When studying the DPA resistance of S-boxes, the research community is divided in their
opinions on what properties should be considered. So far, there exist only a few properties …

Redefining the transparency order

K Chakraborty, S Sarkar, S Maitra, B Mazumdar… - Designs, codes and …, 2017 - Springer
In this paper, we consider the multi-bit Differential Power Analysis (DPA) in the Hamming
weight model. In this regard, we revisit the definition of Transparency Order (TO TO) from the …

The notion of transparency order, revisited

H Li, Y Zhou, J Ming, G Yang, C Jin - The Computer Journal, 2020 - academic.oup.com
We revisit the definition of transparency order (TO) and that of modified transparency order
(MTO) as well, which were proposed to measure the resistance of substitution boxes (S …

A secure key dependent dynamic substitution method for symmetric cryptosystems

A Ejaz, IA Shoukat, U Iqbal, A Rauf, A Kanwal - PeerJ Computer Science, 2021 - peerj.com
The biggest challenge for symmetric cryptosystems is to replace their static substitution with
dynamic substitution, because static substitution S-boxes make the symmetric block ciphers …

[PDF][PDF] Applications of evolutionary computation to cryptology

S Picek - 2015 - repository.ubn.ru.nl
Untitled Page 1 Page 2 Page 3 Applications of Evolutionary Computation to Cryptology
Stjepan Picek Page 4 Copyright c Stjepan Picek, 2015 ISBN: 978-94-6295-238-6 IPA …

Modified transparency order property: solution or just another attempt

S Picek, B Mazumdar, D Mukhopadhyay… - Security, Privacy, and …, 2015 - Springer
S-boxes are usual targets of side-channel attacks and it is an open problem to develop
design techniques for S-boxes with improved DPA resistance. One result along that line is …

Combinatorial optimization in cryptography

K Knežević - 2017 40th International Convention on Information …, 2017 - ieeexplore.ieee.org
The known attacks on different cryptosystems lead to a number of criteria that the
implemented cryptographic algorithms (ciphers) must satisfy. The design of cryptographic …