S-boxes, typically the only nonlinear part of a block cipher, are the heart of symmetric cryptographic primitives. They significantly impact the cryptographic strength and the implementation characteristics of an algorithm. Due to their simplicity, quadratic vectorial Boolean functions are preferred when efficient implementations for a variety of applications are of concern. Many characteristics of a function stay invariant under affine equivalence. So far, all 6-bit Boolean functions, 3- and 4-bit permutations have been classified up to affine equivalence. At FSE 2017, Bozoliv et al. presented the first classification of 5-bit quadratic permutations. In this work, we propose an adaptation of their work resulting in a highly efficient algor...
Block ciphers play a key role in many cryptographic protocols that provide communications security i...
Abstract—In this paper, we propose a new synchronous stream cipher called SSCQF whose secret-key is ...
Two significant recent advances in cryptanalysis, namely the differential attack put forward by Biha...
S-boxes, typically the only nonlinear part of a block cipher, are the heart of symmetric cryptograph...
Classification of vectorial Boolean functions up to affine equivalence is used widely to analyze var...
An important question in designing cryptographic functions including substitution boxes (S-boxes) is...
This paper presents two algorithms for solving the linear and the affine equivalence problem for arb...
This thesis discusses new results on the design and the existence of cryptographically strong Boolea...
We propose a simple method of constructing S-boxes using Boolean functions and permutations. Let n b...
Bit permutations are efficient linear functions often used for lightweight cipher designs. However, ...
Substitution boxes with strong cryptographic properties are commonly used in block ciphers to provid...
. A Boolean function f satisfies PC(l) of order k if f(x) 8 f(x 8 ff) is balanced for any ff such t...
Threshold Implementation (TI) is an elegant and widely accepted countermeasure against 1-st order Di...
Abstract:- In this paper two methods of designing Balanced Boolean functions for cryptographical tra...
The thesis focuses on an algebraic description of S-boxes by the special type of quadratic equations...
Block ciphers play a key role in many cryptographic protocols that provide communications security i...
Abstract—In this paper, we propose a new synchronous stream cipher called SSCQF whose secret-key is ...
Two significant recent advances in cryptanalysis, namely the differential attack put forward by Biha...
S-boxes, typically the only nonlinear part of a block cipher, are the heart of symmetric cryptograph...
Classification of vectorial Boolean functions up to affine equivalence is used widely to analyze var...
An important question in designing cryptographic functions including substitution boxes (S-boxes) is...
This paper presents two algorithms for solving the linear and the affine equivalence problem for arb...
This thesis discusses new results on the design and the existence of cryptographically strong Boolea...
We propose a simple method of constructing S-boxes using Boolean functions and permutations. Let n b...
Bit permutations are efficient linear functions often used for lightweight cipher designs. However, ...
Substitution boxes with strong cryptographic properties are commonly used in block ciphers to provid...
. A Boolean function f satisfies PC(l) of order k if f(x) 8 f(x 8 ff) is balanced for any ff such t...
Threshold Implementation (TI) is an elegant and widely accepted countermeasure against 1-st order Di...
Abstract:- In this paper two methods of designing Balanced Boolean functions for cryptographical tra...
The thesis focuses on an algebraic description of S-boxes by the special type of quadratic equations...
Block ciphers play a key role in many cryptographic protocols that provide communications security i...
Abstract—In this paper, we propose a new synchronous stream cipher called SSCQF whose secret-key is ...
Two significant recent advances in cryptanalysis, namely the differential attack put forward by Biha...