The thesis focuses on an algebraic description of S-boxes by the special type of quadratic equations, defined as biaffine equations. Biaffine equations satisfying S-boxes of higher order may not even exist. However, the special type of S-boxes en- ables to find such equations also for S-boxes of higher order. The S-box in the block cipher Rijndael, composed of the inverse function and the affine transformation, is an example of such special type of S-boxes. The thesis proves that a number of biaffine equations satisfying an S-box of this type does not depend on the affine function. The thesis also proves that for every S-box of order n formed by the in- verse function there exist at least 3n − 1 biaffine equations satisfying this S-box.
S-Boxes are the key building blocks in the design of the block ciphers. They are basically used to h...
We investigate S-boxes defined by pairs of Orthogonal Cellular Automata (OCA), motivated by the fact...
Due to the success of differential and linear attacks on a large number of encryption algorithms, it...
Abstract—The algebraic immunity of an S-box depends on the number and type of linearly independent m...
Springer2nd International Conference on 'Networked Digital Technologies', NDT 2010 -- 7 July 2010 th...
S-boxes, typically the only nonlinear part of a block cipher, are the heart of symmetric cryptograph...
Power mapping based S-boxes, especially those with finite field inversion, have received significant...
Substitution boxes with strong cryptographic properties are commonly used in block ciphers to provid...
AbstractSeveral recently proposed block ciphers such as AES, Camellia, Shark, Square and Hierocrypt ...
An important question in designing cryptographic functions including substitution boxes (S-boxes) is...
Substitution boxes are the only nonlinear component of the symmetric key cryptography and play a key...
This paper presents two algorithms for solving the linear and the affine equivalence problem for arb...
The algebraic expression of the Advanced Encryption Standard (AES) RIJNDAEL S-box involved only 9 te...
S-Boxes are the key building blocks in the design of the block ciphers. They are basically used to h...
Block ciphers play a key role in many cryptographic protocols that provide communications security i...
S-Boxes are the key building blocks in the design of the block ciphers. They are basically used to h...
We investigate S-boxes defined by pairs of Orthogonal Cellular Automata (OCA), motivated by the fact...
Due to the success of differential and linear attacks on a large number of encryption algorithms, it...
Abstract—The algebraic immunity of an S-box depends on the number and type of linearly independent m...
Springer2nd International Conference on 'Networked Digital Technologies', NDT 2010 -- 7 July 2010 th...
S-boxes, typically the only nonlinear part of a block cipher, are the heart of symmetric cryptograph...
Power mapping based S-boxes, especially those with finite field inversion, have received significant...
Substitution boxes with strong cryptographic properties are commonly used in block ciphers to provid...
AbstractSeveral recently proposed block ciphers such as AES, Camellia, Shark, Square and Hierocrypt ...
An important question in designing cryptographic functions including substitution boxes (S-boxes) is...
Substitution boxes are the only nonlinear component of the symmetric key cryptography and play a key...
This paper presents two algorithms for solving the linear and the affine equivalence problem for arb...
The algebraic expression of the Advanced Encryption Standard (AES) RIJNDAEL S-box involved only 9 te...
S-Boxes are the key building blocks in the design of the block ciphers. They are basically used to h...
Block ciphers play a key role in many cryptographic protocols that provide communications security i...
S-Boxes are the key building blocks in the design of the block ciphers. They are basically used to h...
We investigate S-boxes defined by pairs of Orthogonal Cellular Automata (OCA), motivated by the fact...
Due to the success of differential and linear attacks on a large number of encryption algorithms, it...