We present a bit-vector variable implementation for the constraint programming (CP) solver Gecode and its application to the problem of finding high-quality cryptographic substitution boxes (S-boxes). S-boxes are a component in some cryptographic protocols, for example DES, which are critical to the strength of the entire system. S-boxes are arrays of bit-vectors, where each bit-vector is itself an array of bits.The desirable properties of an S-box can be described as relationships between its constituent bit-vectors. We represent substitution boxes as arrays of bit-vector variables in Gecode in order to leverage CP techniques for finding high-quality S-boxes. In a CP solver, bit-vectors can alternatively be represented as sets or as arrays...
At a fundamental level, the security of symmetric key cryptosystems ties back to Claude Shannon\u27s...
© 2012 Dr. Trevor Alexander HansenSoftware defects are a curse, they are so difficult to find that m...
Substitution boxes (S-boxes) are nonlinear mappings that represent one of the core parts of many cry...
International audienceWe address the challenge of developing efficient Constraint Programming-based ...
Substitution boxes (S-boxes) play a crucial role in modern cryptographic algorithms, providingnon-li...
We investigate whether it is possible to evolve cryptographically strong S-boxes that have additiona...
Part 5: Short PapersInternational audienceBoolean functions and substitution boxes (S-boxes) represe...
The aim of this work is to synthesize 8*8 substitution boxes (S-boxes) for block ciphers. The confus...
Substitution Boxes (S-boxes) are nonlinear objects often used in the design of cryptographic algorit...
Existing literature shows that genetic algorithms can be successfully used for automated constructio...
Cellular Automata (CA) represent an interesting approach to design SubstitutionBoxes (S-boxes) havin...
Bit permutations are efficient linear functions often used for lightweight cipher designs. However, ...
Among many theories supported by SMT solvers, the theory of finite-precision bit-vector arithmetic i...
AbstractIn this paper, we present a method for the construction of 8×8 substitution boxes used in th...
International audienceIn this paper, we introduce Constraint Programming (CP) models to solve a cryp...
At a fundamental level, the security of symmetric key cryptosystems ties back to Claude Shannon\u27s...
© 2012 Dr. Trevor Alexander HansenSoftware defects are a curse, they are so difficult to find that m...
Substitution boxes (S-boxes) are nonlinear mappings that represent one of the core parts of many cry...
International audienceWe address the challenge of developing efficient Constraint Programming-based ...
Substitution boxes (S-boxes) play a crucial role in modern cryptographic algorithms, providingnon-li...
We investigate whether it is possible to evolve cryptographically strong S-boxes that have additiona...
Part 5: Short PapersInternational audienceBoolean functions and substitution boxes (S-boxes) represe...
The aim of this work is to synthesize 8*8 substitution boxes (S-boxes) for block ciphers. The confus...
Substitution Boxes (S-boxes) are nonlinear objects often used in the design of cryptographic algorit...
Existing literature shows that genetic algorithms can be successfully used for automated constructio...
Cellular Automata (CA) represent an interesting approach to design SubstitutionBoxes (S-boxes) havin...
Bit permutations are efficient linear functions often used for lightweight cipher designs. However, ...
Among many theories supported by SMT solvers, the theory of finite-precision bit-vector arithmetic i...
AbstractIn this paper, we present a method for the construction of 8×8 substitution boxes used in th...
International audienceIn this paper, we introduce Constraint Programming (CP) models to solve a cryp...
At a fundamental level, the security of symmetric key cryptosystems ties back to Claude Shannon\u27s...
© 2012 Dr. Trevor Alexander HansenSoftware defects are a curse, they are so difficult to find that m...
Substitution boxes (S-boxes) are nonlinear mappings that represent one of the core parts of many cry...