We investigate several cryptographic properties in 8-bit S-boxes obtained by quasigroups of order 4 and 16 with several different algebraic constructions. Additionally, we offer a new construction of $N$-bit S-boxes by using different number of two layers -- the layer of bijectional quasigroup string transformations, and the layer of modular addition with $N$-bit constants. The best produced 8-bit S-boxes so far are regular and have algebraic degree 7, nonlinearity 98 (linearity 60), differential uniformity 8, and autocorrelation 88. Additionally we obtained 8-bit S-boxes with nonlinearity 100 (linearity 56), differential uniformity 10, autocorrelation 88, and minimal algebraic degree 6. Relatively small set of performed experiments compare...
The aim of this work is to find large S-Boxes, typically operating on 8 bits, having both good crypt...
2nd International Workshop on Arithmetic of Finite Fields -- JUL 06-09, 2008 -- Siena, ITALYS-boxes ...
This article presents one of the main transformations of symmetric block ciphers used to protect con...
We investigate several cryptographic properties in 8-bit S-boxes obtained by quasigroups of order 4 ...
The aim of this paper is to construct S-boxes of different sizes with good cryptographic properties....
The aim of this paper is to construct S-boxes of different sizes with good cryptographic properties....
Cryptology is the science of secret communication, which consists of two complementary disciplines: ...
peer reviewedThe block cipher Kuznyechik and the hash function Streebog were recently standardized b...
At a fundamental level, the security of symmetric key cryptosystems ties back to Claude Shannon\u27s...
In this paper we present a construction for S-boxes using quasi-cyclic codes. We obtain S-boxes with...
peer reviewedThe Russian Federation's standardization agency has recently published a hash function ...
AbstractIn this paper, we present a method for the construction of 8×8 substitution boxes used in th...
Substitution boxes are important parts in many block and stream ciphers. The emergence of a range of...
Substitution Boxes (S-Boxes) are crucial components in the design of many symmetric ciphers. The sec...
AMS Subj. Classification: Primary 20N05, Secondary 94A60The intention of this research is to justify ...
The aim of this work is to find large S-Boxes, typically operating on 8 bits, having both good crypt...
2nd International Workshop on Arithmetic of Finite Fields -- JUL 06-09, 2008 -- Siena, ITALYS-boxes ...
This article presents one of the main transformations of symmetric block ciphers used to protect con...
We investigate several cryptographic properties in 8-bit S-boxes obtained by quasigroups of order 4 ...
The aim of this paper is to construct S-boxes of different sizes with good cryptographic properties....
The aim of this paper is to construct S-boxes of different sizes with good cryptographic properties....
Cryptology is the science of secret communication, which consists of two complementary disciplines: ...
peer reviewedThe block cipher Kuznyechik and the hash function Streebog were recently standardized b...
At a fundamental level, the security of symmetric key cryptosystems ties back to Claude Shannon\u27s...
In this paper we present a construction for S-boxes using quasi-cyclic codes. We obtain S-boxes with...
peer reviewedThe Russian Federation's standardization agency has recently published a hash function ...
AbstractIn this paper, we present a method for the construction of 8×8 substitution boxes used in th...
Substitution boxes are important parts in many block and stream ciphers. The emergence of a range of...
Substitution Boxes (S-Boxes) are crucial components in the design of many symmetric ciphers. The sec...
AMS Subj. Classification: Primary 20N05, Secondary 94A60The intention of this research is to justify ...
The aim of this work is to find large S-Boxes, typically operating on 8 bits, having both good crypt...
2nd International Workshop on Arithmetic of Finite Fields -- JUL 06-09, 2008 -- Siena, ITALYS-boxes ...
This article presents one of the main transformations of symmetric block ciphers used to protect con...