Abstract. S-Boxes are the key components of many cryptographic primitives and designing them to improve resilience to attacks such as linear or differential crypt-analysis is well understood. In this paper, we investigate techniques that can be used to reverse-engineer S-box design and illustrate those by studying the S-Box F of the Skipjack block cipher whose design process so far remained secret. We first show that the linear properties of F are far from random and propose a design criteria, along with an algorithm which generates S-Boxes very similar to that of Skipjack. Then we consider more general S-box decomposition problems and propose new methods for decomposing S-Boxes built from arithmetic operations or as a Feistel Network of up...
S-Boxes are the key building blocks in the design of the block ciphers. They are basically used to h...
Side-channel attacks exploit physical characteristics of implementations of cryptographic algorithms...
S-Boxes are the key building blocks in the design of the block ciphers. They are basically used to h...
S-Boxes are the key components of many cryptographic primitives and designing them to improve resili...
S-Boxes are the key components of many cryptographic primitives and designing them to improve resili...
peer reviewedThe Russian Federation's standardization agency has recently published a hash function ...
peer reviewedThe Russian Federation's standardization agency has recently published a hash function ...
The use of the S-box is an important component of many symmetric block cipher algorithms used in mod...
Bit permutations are efficient linear functions often used for lightweight cipher designs. However, ...
We investigate whether it is possible to evolve cryptographically strong S-boxes that have additiona...
Substitution boxes (S-boxes) are a crucial component of DES-like block ciphers. This research addres...
In this paper we study the problem of recovering a secret S-box from its difference distribution tab...
In most modern symmetric ciphers, substitution boxes are non-linear core components that provide rob...
S-Boxes are the key building blocks in the design of the block ciphers. They are basically used to h...
The block cipher is an important means to provide data confidentiality in reality, and the S-box is ...
S-Boxes are the key building blocks in the design of the block ciphers. They are basically used to h...
Side-channel attacks exploit physical characteristics of implementations of cryptographic algorithms...
S-Boxes are the key building blocks in the design of the block ciphers. They are basically used to h...
S-Boxes are the key components of many cryptographic primitives and designing them to improve resili...
S-Boxes are the key components of many cryptographic primitives and designing them to improve resili...
peer reviewedThe Russian Federation's standardization agency has recently published a hash function ...
peer reviewedThe Russian Federation's standardization agency has recently published a hash function ...
The use of the S-box is an important component of many symmetric block cipher algorithms used in mod...
Bit permutations are efficient linear functions often used for lightweight cipher designs. However, ...
We investigate whether it is possible to evolve cryptographically strong S-boxes that have additiona...
Substitution boxes (S-boxes) are a crucial component of DES-like block ciphers. This research addres...
In this paper we study the problem of recovering a secret S-box from its difference distribution tab...
In most modern symmetric ciphers, substitution boxes are non-linear core components that provide rob...
S-Boxes are the key building blocks in the design of the block ciphers. They are basically used to h...
The block cipher is an important means to provide data confidentiality in reality, and the S-box is ...
S-Boxes are the key building blocks in the design of the block ciphers. They are basically used to h...
Side-channel attacks exploit physical characteristics of implementations of cryptographic algorithms...
S-Boxes are the key building blocks in the design of the block ciphers. They are basically used to h...