[图书][B] Cryptographic Boolean functions and applications

TW Cusick, P Stanica - 2017 - books.google.com
Cryptographic Boolean Functions and Applications, Second Edition is designed to be a
comprehensive reference for the use of Boolean functions in modern cryptography. While …

Efficient image encryption scheme using Henon map, dynamic S-boxes and elliptic curve cryptography

S Ibrahim, A Alharbi - IEEE Access, 2020 - ieeexplore.ieee.org
Image encryption schemes can be vulnerable to a variety of cryptanalysis attacks. The use of
key-dependent dynamic S-boxes has been shown to improve security. Threats of chosen …

Efficient key-dependent dynamic S-boxes based on permutated elliptic curves

S Ibrahim, AM Abbas - Information Sciences, 2021 - Elsevier
Key-dependent dynamic substitution boxes (S-boxes) are important building blocks of many
image encryption schemes, in which a session key controls the construction of dynamic S …

Accurate estimates of the data complexity and success probability for various cryptanalyses

C Blondeau, B Gérard, JP Tillich - Designs, codes and cryptography, 2011 - Springer
Many attacks on encryption schemes rely on statistical considerations using
plaintext/ciphertext pairs to find some information on the key. We provide here simple …

[PDF][PDF] Making AES stronger: AES with key dependent S-box

GN Krishnamurthy, V Ramaswamy - IJCSNS International Journal of …, 2008 - Citeseer
With the fast evolution of digital data exchange, security information becomes much
important in data storage and transmission. In this paper, we show a new property of …

A generalization of algebraic expression for nonlinear component of symmetric key algorithms of any characteristic p

N Munir, M Khan - 2018 international conference on applied …, 2018 - ieeexplore.ieee.org
Recently several block ciphers are proposed which are based on the inversion mapping
over binary Galois field with n-input. These proposed block ciphers are Camellia, AES …

Ciphertext-only fault attacks on PRESENT

F De Santis, OM Guillen, E Sakic, G Sigl - Lightweight Cryptography for …, 2015 - Springer
In this work, we introduce fault attacks on PRESENT with faulty ciphertexts-only. In contrast
to current differential fault attacks on PRESENT, which are mostly chosen-plaintext attacks …

Performance Comparison of Advanced Encryption Standard (AES) and AES key dependent S-box-Simulation using MATLAB

S Shivkumar, G Umamaheswari - … International Conference on …, 2011 - ieeexplore.ieee.org
The growing popularity of mobile and hand held devices ignited the growth of wireless
networks over the past years. Wireless data communications have transformed not only the …

Attack resistant chaos-based cryptosystem by modified baker map and logistic map

D Chatterjee, BG Banik, A Banik - International Journal of …, 2023 - inderscienceonline.com
In this paper, a new substitution-diffusion type chaos-based cryptosystem is proposed, which
can encrypt greyscale images having arbitrary resolution. In substitution, image pixels are …

Algebraic construction of cryptographically good binary linear transformations

B Aslan, MT Sakallı - Security and Communication Networks, 2014 - Wiley Online Library
ABSTRACT Maximum Distance Separable (MDS) and Maximum Distance Binary Linear
(MDBL) codes are used as diffusion layers in the design of the well‐known block ciphers like …