Random S-boxes generation methods for symmetric cryptography

I Gorbenko, A Kuznetsov, Y Gorbenko… - 2019 IEEE 2nd …, 2019 - ieeexplore.ieee.org
The main efficiency indicators of cryptographic Boolean functions and vector mappings,
which are used as nodes of the complexity in symmetric cryptographic transformations, are …

A 100% stable sense-amplifier-based physically unclonable function with individually embedded non-volatile memory

KU Choi, S Baek, J Heo, JP Hong - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper is presented a sense-amplifier-based physically unclonable function (PUF) with
individually embedded non-volatile memory (eNVM) that offers 100% stable random bits …

Design, implementation and analysis of keyed hash functions based on chaotic maps and neural networks

N Abdoun - 2019 - hal.science
The hash functions are the most useful primitives in cryptography. They play an important
role in data integrity, message authentication, digital signature and authenticated encryption …

Implementation of cryptanalysis based on FPGA hardware using AES with SHA-1

S Al-Shara'a, RK Ibraheem… - … conference on smart …, 2019 - ieeexplore.ieee.org
The meaning of security is to protect something important from not authorized peoples.
Cryptography is one of the security systems. Many applications could be used in the security …

[图书][B] Advanced data structures: theory and applications

S Saha, S Shukla - 2019 - taylorfrancis.com
Advanced data structures is a core course in Computer Science which most graduate
program in Computer Science, Computer Science and Engineering, and other allied …

MGR hash functions

K Bussi, D Dey, PR Mishra, BK Dass - Cryptologia, 2019 - Taylor & Francis
Abstract GOST-R 34.11-94 is a Russian standard cryptographic hash function that was
introduced in 1994 by the Russian Federal Agency for the purposes of information …

An analysis of cryptographic algorithm strength based on S-box properties

IR Dragomir, SB Măluţan… - 2019 11th International …, 2019 - ieeexplore.ieee.org
It is well known that, the block algorithms supply security through its components (S-boxes,
boolean functions, polynomials). Depending on the characteristics and properties of their …

Security aspects of the Cayley hash function using discrete heisenberg group

V Vibitha Kochamani, PL Lilly - Journal of Discrete Mathematical …, 2019 - Taylor & Francis
We execute the average running time of the various binary strings of different length and
evaluate the other useful characteristics of a hash function which is to be Pseudo …

Modified Form of Cayley Hash Function

VV Kochamani, PL Lilly - Asian Journal of Engineering and Applied …, 2019 - ajeat.com
Abstract In 1994 (AT CRYPTO94) introduced the celebrated Zemor-Tillich hash function over
SL2 (F2n) is mathematically very efficient and simple method but now finally it was broken …

Computing the Number of Equivalent Classes on

X Zeng, G Yang - arXiv preprint arXiv:1912.11189, 2019 - arxiv.org
Affine equivalent classes of Boolean functions have many applications in modern
cryptography and circuit design. Previous publications have shown that affine equivalence …