Cryptographic S-boxes are fundamental in key-iterated sub- stitution permutation network (SPN) designs for block ciphers. As a natural way for realizing Shannon’s confusion and diffusion properties in cryptographic primitives through nonlinear and linear behavior, re- spectively, SPN designs served as the basis for the Advanced Encryption Standard and a variety of other block ciphers. In this work we present a methodology for minimizing the logic resources for n-bit affine-power S- boxes over Galois fields based on measurable security properties and find- ing corresponding area-efficient combinational implementations in hard- ware. Motivated by the potential need for new and larger S-boxes, we use our methodology to find area-optimized circ...
Substitution Boxes (S-Boxes) are crucial components in the design of many symmetric ciphers. The sec...
Abstract. In this paper, we present a new classification of 4-bit optimal S-boxes. All optimal 4-bit...
This paper presents two algorithms for solving the linear and the affine equivalence problem for arb...
Cryptographic S-boxes are fundamental in key-iterated sub- stitution permutation network (SPN) desig...
Obtaining compact, while cryptographically strong, S-boxes is a challenging task required for hardwa...
Obtaining compact, while cryptographically strong, S-boxes is a challenging task required for hardwa...
Bit permutations are efficient linear functions often used for lightweight cipher designs. However, ...
2nd International Workshop on Arithmetic of Finite Fields -- JUL 06-09, 2008 -- Siena, ITALYS-boxes ...
Substitution boxes are the only nonlinear component of the symmetric key cryptography and play a key...
This work focuses on side-channel resilient design strategies for symmetrickey cryptographic primiti...
This work focuses on side-channel resilient design strategies for symmetrickey cryptographic primiti...
2nd International Workshop on Arithmetic of Finite Fields -- JUL 06-09, 2008 -- Siena, ITALY -- Micr...
This work focuses on side-channel resilient design strategies for symmetrickey cryptographic primiti...
Abstract. A key step in the Advanced Encryption Standard (AES) algorithm is the “S-box. ” Many imple...
Abstract. This paper describes the efficient implementation of Max-imum Distance Separable (MDS) map...
Substitution Boxes (S-Boxes) are crucial components in the design of many symmetric ciphers. The sec...
Abstract. In this paper, we present a new classification of 4-bit optimal S-boxes. All optimal 4-bit...
This paper presents two algorithms for solving the linear and the affine equivalence problem for arb...
Cryptographic S-boxes are fundamental in key-iterated sub- stitution permutation network (SPN) desig...
Obtaining compact, while cryptographically strong, S-boxes is a challenging task required for hardwa...
Obtaining compact, while cryptographically strong, S-boxes is a challenging task required for hardwa...
Bit permutations are efficient linear functions often used for lightweight cipher designs. However, ...
2nd International Workshop on Arithmetic of Finite Fields -- JUL 06-09, 2008 -- Siena, ITALYS-boxes ...
Substitution boxes are the only nonlinear component of the symmetric key cryptography and play a key...
This work focuses on side-channel resilient design strategies for symmetrickey cryptographic primiti...
This work focuses on side-channel resilient design strategies for symmetrickey cryptographic primiti...
2nd International Workshop on Arithmetic of Finite Fields -- JUL 06-09, 2008 -- Siena, ITALY -- Micr...
This work focuses on side-channel resilient design strategies for symmetrickey cryptographic primiti...
Abstract. A key step in the Advanced Encryption Standard (AES) algorithm is the “S-box. ” Many imple...
Abstract. This paper describes the efficient implementation of Max-imum Distance Separable (MDS) map...
Substitution Boxes (S-Boxes) are crucial components in the design of many symmetric ciphers. The sec...
Abstract. In this paper, we present a new classification of 4-bit optimal S-boxes. All optimal 4-bit...
This paper presents two algorithms for solving the linear and the affine equivalence problem for arb...