We introduce a new construction method of diffusion layers for Substitution Permutation Network (SPN) structures along with its security proofs. The new method can be used in block ciphers, stream ciphers, hash functions, and sponge constructions. Moreover, we define a new stream cipher mode of operation through a fixed pseudorandom permutation and provide its security proofs in the indistinguishability model. We refer to a stream cipher as a Small Internal State Stream (SISS) cipher if its internal state size is less than twice its key size. There are not many studies about how to design and analyze SISS ciphers due to the criterion on the internal state sizes, resulting from the classical tradeoff attacks. We utilize our new mode and diff...
The main objective of this thesis is to examine the trade-offs between security and efficiency with...
AbstractThe shrinking generator is a simple keystream generator with applications in stream ciphers,...
The main objective of this thesis is to examine the trade-offs between security and efficiency with...
Most proposed stream ciphers are cracked through vulnerability of input and output. This paper is fo...
Abstract — In this paper, we examine a class of block ciphers referred to as substitutionpermutation...
Many modern stream ciphers consist of a keystream generator and a key schedule algorithm. In fielded...
This thesis presents new cryptanalysis results for several different streamcipher constructions. In ...
Abstract. The internal state size of a stream cipher is supposed to be at least twice the key length...
Summary form only given. When designing symmetric ciphers, security and performance are of utmost im...
This paper proposes a stream cipher with the advantages of efficiency and non-linearity of a key str...
Motivated by the recent trend towards low multiplicative complexity blockciphers (e.g., Zorro, CHES ...
A block cipher, in general, consist of several repetitions of a round transformation. A round transf...
This paper represents a developed cryptographic information protection algorithm based on an substit...
In the world of cryptography, stream ciphers are known as primitives used to ensure privacy over a c...
Designing cryptographic permutations and block ciphers using a substitutionpermutation network (SPN)...
The main objective of this thesis is to examine the trade-offs between security and efficiency with...
AbstractThe shrinking generator is a simple keystream generator with applications in stream ciphers,...
The main objective of this thesis is to examine the trade-offs between security and efficiency with...
Most proposed stream ciphers are cracked through vulnerability of input and output. This paper is fo...
Abstract — In this paper, we examine a class of block ciphers referred to as substitutionpermutation...
Many modern stream ciphers consist of a keystream generator and a key schedule algorithm. In fielded...
This thesis presents new cryptanalysis results for several different streamcipher constructions. In ...
Abstract. The internal state size of a stream cipher is supposed to be at least twice the key length...
Summary form only given. When designing symmetric ciphers, security and performance are of utmost im...
This paper proposes a stream cipher with the advantages of efficiency and non-linearity of a key str...
Motivated by the recent trend towards low multiplicative complexity blockciphers (e.g., Zorro, CHES ...
A block cipher, in general, consist of several repetitions of a round transformation. A round transf...
This paper represents a developed cryptographic information protection algorithm based on an substit...
In the world of cryptography, stream ciphers are known as primitives used to ensure privacy over a c...
Designing cryptographic permutations and block ciphers using a substitutionpermutation network (SPN)...
The main objective of this thesis is to examine the trade-offs between security and efficiency with...
AbstractThe shrinking generator is a simple keystream generator with applications in stream ciphers,...
The main objective of this thesis is to examine the trade-offs between security and efficiency with...