Abstract. The Substitution box (Sbox) plays an important role in the design of both block and stream ciphers as, in most cases, it is the only nonlinear layer of the cipher. There are many requirments of the choice of the Sbox to aviod various attacks. In this paper, we mathematically characterizes the truncated differential cryptanalysis invented by Kundsen, which is called the t-th differential uniformity in this paper. It is found that, although some S-boxes used in certain previously ciphers have optimal differential uniformity, they have very bad t-th differential uniformity for some integer t. This gives an entile possibility to improve the cryptanalysis of these ciphers. As an application of this concept, we propose a construction of...
Permutations with low differential uniformity, high nonlinearity and high algebraic degree over F22k...
Substitution boxes (S-boxes) are a crucial component of DES-like block ciphers. This research addres...
Bit permutations are efficient linear functions often used for lightweight cipher designs. However, ...
Lightweight block cipher algorithms are vital for constrained environment. Substitution box (S-box) ...
Lightweight block cipher algorithms are vital for constrained environment. Substitution box (S-box) ...
Resistance against differential cryptanalysis is an important design criteria for any modern block c...
Resistance against differential cryptanalysis is an important design criteria for any modern block c...
Block ciphers play a key role in many cryptographic protocols that provide communications security i...
AbstractFunctions with low differential uniformity can be used as the s-boxes of symmetric cryptosys...
Functions with low differential uniformity can be used as the s-boxes of symmetric cryptosystems as...
Differential distribution and linear approximation tables are the main security criteria for S-box d...
Differentially 4-uniform permutations on F22k with high nonlinearity are often chosen as Substitutio...
Permutations with low differential uniformity, high algebraic degree, and high nonlinearity over F22...
A block cipher, in general, consist of several repetitions of a round transformation. A round transf...
Functions with low differential uniformity can be used as the s-boxes of symmetric cryptosystems as...
Permutations with low differential uniformity, high nonlinearity and high algebraic degree over F22k...
Substitution boxes (S-boxes) are a crucial component of DES-like block ciphers. This research addres...
Bit permutations are efficient linear functions often used for lightweight cipher designs. However, ...
Lightweight block cipher algorithms are vital for constrained environment. Substitution box (S-box) ...
Lightweight block cipher algorithms are vital for constrained environment. Substitution box (S-box) ...
Resistance against differential cryptanalysis is an important design criteria for any modern block c...
Resistance against differential cryptanalysis is an important design criteria for any modern block c...
Block ciphers play a key role in many cryptographic protocols that provide communications security i...
AbstractFunctions with low differential uniformity can be used as the s-boxes of symmetric cryptosys...
Functions with low differential uniformity can be used as the s-boxes of symmetric cryptosystems as...
Differential distribution and linear approximation tables are the main security criteria for S-box d...
Differentially 4-uniform permutations on F22k with high nonlinearity are often chosen as Substitutio...
Permutations with low differential uniformity, high algebraic degree, and high nonlinearity over F22...
A block cipher, in general, consist of several repetitions of a round transformation. A round transf...
Functions with low differential uniformity can be used as the s-boxes of symmetric cryptosystems as...
Permutations with low differential uniformity, high nonlinearity and high algebraic degree over F22k...
Substitution boxes (S-boxes) are a crucial component of DES-like block ciphers. This research addres...
Bit permutations are efficient linear functions often used for lightweight cipher designs. However, ...