Design of substitution nodes (S-Boxes) of a block cipher intended for preliminary encryption of confidential information

A Khompysh, N Kapalova, K Algazy… - Cogent …, 2022 - Taylor & Francis
This paper considers a new method for obtaining an S-box, which is one of the nonlinear
transformations used in modern block-symmetric cipher systems. This method is based on …

A controllable privacy data transmission mechanism for internet of things system based on blockchain

ZX Nie, YZT Long, SL Zhang… - International Journal of …, 2022 - journals.sagepub.com
With the in-depth integration of traditional industries and information technology in Internet of
things, wireless sensor networks are used more frequently to transmit the data generated …

Fog-based single sign-on authentication protocol for electronic healthcare applications

S Mookherji, V Odelu, R Prasath… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Increasing use of electronic healthcare (eHealth) services demands efficient and secure
solutions. Such solutions need to ensure the prevention of unauthorized access to the …

Fast hashing on the Pentium

A Bosselaers, R Govaerts, J Vandewalle - Advances in Cryptology …, 1996 - Springer
With the advent of the Pentium processor parallelization finally became available to Intel
based computer systems. One of the design principles of the MD4-family of hash functions …

Hyper-bent functions and cyclic codes

C Carlet, P Gaborit - Journal of Combinatorial Theory, Series A, 2006 - Elsevier
Bent functions are those Boolean functions whose Hamming distance to the Reed–Muller
code of order 1 equal 2n-1-2n/2-1 (where the number n of variables is even). These …

Cubic bent functions outside the completed Maiorana-McFarland class

AA Polujan, A Pott - Designs, Codes and Cryptography, 2020 - Springer
In this paper we prove that in opposite to the cases of 6 and 8 variables, the Maiorana-
McFarland construction does not describe the whole class of cubic bent functions in n …

Foiling birthday attacks in length-doubling transformations: Benes: a non-reversible alternative to Feistel

W Aiello, R Venkatesan - International Conference on the Theory and …, 1996 - Springer
For many cryptographic primitives, eg, hashing and pseudorandom functions & generators,
doubling the output length is useful even if the doubling transformation is not reversible. For …

Cross-correlation analysis of cryptographically useful Boolean functions and S-boxes

P Sarkar, S Maitra - Theory of Computing Systems, 2002 - Springer
We use the cross-correlation function as a fundamental tool to study cryptographic
properties of Boolean functions. This provides a unified treatment of a large section of …

Constructing an ideal hash function from weak ideal compression functions

M Liskov - Selected Areas in Cryptography: 13th International …, 2007 - Springer
We introduce the notion of a weak ideal compression function, which is vulnerable to strong
forms of attack, but is otherwise random. We show that such weak ideal compression …

A vulnerability in implementations of SHA-3, SHAKE, EdDSA, and other NIST-approved algorithms

N Mouha, C Celi - Cryptographers' Track at the RSA Conference, 2023 - Springer
This paper describes a vulnerability in several implementations of the Secure Hash
Algorithm 3 (SHA-3) that have been released by its designers. The vulnerability has been …