* Work supported by the Lithuanian State Science and Studies Foundation.Construction of symmetric cipher S-box based on matrix power function and dependant on key is analyzed. The matrix consisting of plain data bit strings is combined with three round key matrices using arithmetical addition and exponent operations. The matrix power means the matrix powered by other matrix. This operation is linked with two sound one-way functions: the discrete logarithm problem and decomposition problem. The latter is used in the infinite non-commutative group based public key cryptosystems. The mathematical description of proposed S-box in its nature possesses a good “confusion and diffusion” properties and contains variables “of a complex type” as was f...
2nd International Workshop on Arithmetic of Finite Fields -- JUL 06-09, 2008 -- Siena, ITALYS-boxes ...
Substitution Boxes (S-Boxes) are crucial components in the design of many symmetric ciphers. The sec...
We investigate whether it is possible to evolve cryptographically strong S-boxes that have additiona...
The new symmetric cipher S-box construction based on matrix power function is presented. The matrix ...
This article presents one of the main transformations of symmetric block ciphers used to protect con...
* Work is partially supported by the Lithuanian State Science and Studies Foundation.The key agreeme...
Substitution boxes with strong cryptographic properties are commonly used in block ciphers to provid...
A Substitution box (S-box) is an important component used in symmetric key cryptosystems to satisfy ...
This paper proposes a new block encryption algorithm for cryptographic information protection. It de...
Substitution boxes (S-boxes) are a crucial component of DES-like block ciphers. This research addres...
The asymmetric cipher protocol based on decomposition problem in matrix semiring M over semiring of ...
A new enhanced matrix power function (MPF) is presented for the construction of cryptographic primit...
In symmetric block ciphers, substitution and diffusion operations are performed in multiple rounds u...
The use of the S-box is an important component of many symmetric block cipher algorithms used in mod...
Cryptography studies secure communications. In symmetric-key cryptography, the communicating parties...
2nd International Workshop on Arithmetic of Finite Fields -- JUL 06-09, 2008 -- Siena, ITALYS-boxes ...
Substitution Boxes (S-Boxes) are crucial components in the design of many symmetric ciphers. The sec...
We investigate whether it is possible to evolve cryptographically strong S-boxes that have additiona...
The new symmetric cipher S-box construction based on matrix power function is presented. The matrix ...
This article presents one of the main transformations of symmetric block ciphers used to protect con...
* Work is partially supported by the Lithuanian State Science and Studies Foundation.The key agreeme...
Substitution boxes with strong cryptographic properties are commonly used in block ciphers to provid...
A Substitution box (S-box) is an important component used in symmetric key cryptosystems to satisfy ...
This paper proposes a new block encryption algorithm for cryptographic information protection. It de...
Substitution boxes (S-boxes) are a crucial component of DES-like block ciphers. This research addres...
The asymmetric cipher protocol based on decomposition problem in matrix semiring M over semiring of ...
A new enhanced matrix power function (MPF) is presented for the construction of cryptographic primit...
In symmetric block ciphers, substitution and diffusion operations are performed in multiple rounds u...
The use of the S-box is an important component of many symmetric block cipher algorithms used in mod...
Cryptography studies secure communications. In symmetric-key cryptography, the communicating parties...
2nd International Workshop on Arithmetic of Finite Fields -- JUL 06-09, 2008 -- Siena, ITALYS-boxes ...
Substitution Boxes (S-Boxes) are crucial components in the design of many symmetric ciphers. The sec...
We investigate whether it is possible to evolve cryptographically strong S-boxes that have additiona...