[HTML][HTML] A substitution box for lightweight ciphers to secure internet of things
V Panchami, MM Mathews - Journal of King Saud University-Computer and …, 2023 - Elsevier
Abstract The Internet of Things is a resource-constrained device that demands lightweight
cryptographic solutions to achieve high performance and optimal security. In lightweight …
cryptographic solutions to achieve high performance and optimal security. In lightweight …
A new cost function for evolution of s-boxes
Substitution Boxes (S-Boxes) play an important role in many modern-day cryptographic
algorithms, more commonly known as ciphers. Without carefully chosen S-Boxes, such …
algorithms, more commonly known as ciphers. Without carefully chosen S-Boxes, such …
Evolving nonlinear S-boxes with improved theoretical resilience to power attacks
A Freyre-Echevarría, I Martínez-Díaz, CML Pérez… - IEEE …, 2020 - ieeexplore.ieee.org
Substitution boxes are the main nonlinear component of block ciphers. The security of these
ciphers against linear, differential, or side-channel attacks is dependent on the design of …
ciphers against linear, differential, or side-channel attacks is dependent on the design of …
Confused by confusion: Systematic evaluation of DPA resistance of various s-boxes
When studying the DPA resistance of S-boxes, the research community is divided in their
opinions on what properties should be considered. So far, there exist only a few properties …
opinions on what properties should be considered. So far, there exist only a few properties …
Redefining the transparency order
In this paper, we consider the multi-bit Differential Power Analysis (DPA) in the Hamming
weight model. In this regard, we revisit the definition of Transparency Order (TO TO) from the …
weight model. In this regard, we revisit the definition of Transparency Order (TO TO) from the …
The notion of transparency order, revisited
H Li, Y Zhou, J Ming, G Yang, C Jin - The Computer Journal, 2020 - academic.oup.com
We revisit the definition of transparency order (TO) and that of modified transparency order
(MTO) as well, which were proposed to measure the resistance of substitution boxes (S …
(MTO) as well, which were proposed to measure the resistance of substitution boxes (S …
A secure key dependent dynamic substitution method for symmetric cryptosystems
A Ejaz, IA Shoukat, U Iqbal, A Rauf, A Kanwal - PeerJ Computer Science, 2021 - peerj.com
The biggest challenge for symmetric cryptosystems is to replace their static substitution with
dynamic substitution, because static substitution S-boxes make the symmetric block ciphers …
dynamic substitution, because static substitution S-boxes make the symmetric block ciphers …
[PDF][PDF] Applications of evolutionary computation to cryptology
S Picek - 2015 - repository.ubn.ru.nl
Untitled Page 1 Page 2 Page 3 Applications of Evolutionary Computation to Cryptology
Stjepan Picek Page 4 Copyright c Stjepan Picek, 2015 ISBN: 978-94-6295-238-6 IPA …
Stjepan Picek Page 4 Copyright c Stjepan Picek, 2015 ISBN: 978-94-6295-238-6 IPA …
Modified transparency order property: solution or just another attempt
S-boxes are usual targets of side-channel attacks and it is an open problem to develop
design techniques for S-boxes with improved DPA resistance. One result along that line is …
design techniques for S-boxes with improved DPA resistance. One result along that line is …
Combinatorial optimization in cryptography
K Knežević - 2017 40th International Convention on Information …, 2017 - ieeexplore.ieee.org
The known attacks on different cryptosystems lead to a number of criteria that the
implemented cryptographic algorithms (ciphers) must satisfy. The design of cryptographic …
implemented cryptographic algorithms (ciphers) must satisfy. The design of cryptographic …