Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties

G Ivanov, N Nikolov, S Nikova - Cryptography and Communications, 2016 - Springer
Often the S-boxes are the only nonlinear components in a block cipher and as such play an
important role in ensuring its resistance to cryptanalysis. Cryptographic properties and …

[图书][B] Cellular neural networks, multi-scroll chaos and synchronization

JAK Suykens, J Vandewalle - 2005 - books.google.com
For engineering applications that are based on nonlinear phenomena, novel information
processing systems require new methodologies and design principles. This perspective is …

Reverse-engineering the S-box of Streebog, Kuznyechik and STRIBOBr1

A Biryukov, L Perrin, A Udovenko - … on the theory and applications of …, 2016 - Springer
Abstract The Russian Federation's standardization agency has recently published a hash
function called Streebog and a 128-bit block cipher called Kuznyechik. Both of these …

Improved straight-line extraction in the random oracle model with applications to signature aggregation

Y Kondi, A Shelat - International Conference on the Theory and …, 2022 - Springer
The goal of this paper is to improve the efficiency and applicability of straightline extraction
techniques in the random oracle model. Straightline extraction in the random oracle model …

The state of cryptographic hash functions

B Preneel - School organized by the European Educational Forum, 1998 - Springer
This paper describes the state of the art for cryptographic hash functions. Different definitions
are compared, and the few theoretical results on hash functions are discussed. A brief …

[HTML][HTML] Finding nonnormal bent functions

A Canteaut, M Daum, H Dobbertin… - Discrete Applied …, 2006 - Elsevier
The question if there exist nonnormal bent functions was an open question for several years.
A Boolean function in n variables is called normal if there exists an affine subspace of …

[图书][B] Block ciphers-analysis, design and applications

LR Knudsen - 1994 - pdfs.semanticscholar.org
Block Ciphers - Analysis, Design and Applications Page 1 Block Ciphers - Analysis, Design and
Applications Lars Ramkilde Knudsen July 1, 1994 Page 2 2 Page 3 Contents 1 Introduction …

Tiger: A fast new hash function

R Anderson, E Biham - … Workshop Cambridge, UK, February 21–23 1996 …, 1996 - Springer
Among those cryptographic hash function which are not based on block ciphers, MD4 and
Snefru seemed initially quite attractive for applications requiring fast software hashing …

A 2D cryptographic hash function incorporating homomorphic encryption for secure digital signatures

A Wali, H Ravichandran, S Das - Advanced Materials, 2024 - Wiley Online Library
User authentication is a critical aspect of any information exchange system which verifies the
identities of individuals seeking access to sensitive information. Conventionally, this …

Applications of elliptic curve cryptography: A light introduction to elliptic curves and a survey of their applications

R Harkanson, Y Kim - Proceedings of the 12th annual conference on …, 2017 - dl.acm.org
Elliptic curve cryptography (ECC) is a relatively newer form of public key cryptography that
provides more security per bit than other forms of cryptography still being used today. We …