Quantum safe lightweight cryptography with quantum permutation pad

R Kuang, D Lou, A He, A Conlon - 2021 IEEE 6th international …, 2021 - ieeexplore.ieee.org
Quantum permutation pad or QPP was first proposed by Kuang and Bettenburg in 2020 [15].
QPP is a generic quantum algorithm consisting of multiple n-qubits quantum permutation …

An efficient generation and security analysis of substitution box using fingerprint patterns

Ö Şengel, MA Aydın, A Sertbaş - IEEE access, 2020 - ieeexplore.ieee.org
Information and its security have attracted the research community in recent years with
increasing usage of mobile applications. Mobile devices have different security options in …

Generation and evaluation of a new time-dependent dynamic S-box algorithm for AES block cipher cryptosystems

HT Assafli, IA Hashim - IOP Conference Series: Materials …, 2020 - iopscience.iop.org
Cryptographic communication systems depend extensively on the Advanced Encryption
Standard (AES) block cipher algorithm. The encryption strength in the AES algorithm is …

The reality of backdoored S-Boxes—An eye opener

S Fahd, M Afzal, W Iqbal, D Shah, I Khalid - Journal of Information Security …, 2024 - Elsevier
The real-life incidents researched in academia have revealed that (possibly) state-level
efforts are made to camouflage the intentional flaws in the mathematical layer of an S-Box …

Security scheme enhancement for voice over wireless networks

F Hazzaa, AM Shabut, NHM Ali, M Cirstea - Journal of Information Security …, 2021 - Elsevier
This paper proposes a lightweight and low energy encryption algorithm to secure voice
traffic over wireless networks. The proposed algorithm meets the requirements of voice traffic …

Robustness of affine and extended affine equivalent surjective S-box (es) against differential cryptanalysis

S Fahd, M Afzal, D Shah, W Iqbal, A Hai - International Symposium on …, 2022 - Springer
Abstract A Feistel Network (FN) based block cipher relies on a Substitution Box (S-Box) for
achieving the non-linearity. S-Box is carefully designed to achieve optimal cryptographic …

AES S-box construction using different irreducible polynomial and constant 8-bit vector

A Bejo, TB Adji - 2017 IEEE Conference on Dependable and …, 2017 - ieeexplore.ieee.org
S-box plays a major role in the AES algorithm. The strength of S-box depends on the design
and algebraic constructions. In this paper, the construction of S-box will be built using a …

[PDF][PDF] Heuristic methods for the design of cryptographic boolean functions

I Moskovchenko, A Kuznetsov, S Kavun… - International Journal of …, 2019 - academia.edu
In this article, heuristic methods of hill climbing for cryptographic Boolean functions satisfying
the required properties of balance, nonlinearity, autocorrelation, and other stability indicators …

A generalized methodology for designing non-linear elements in symmetric cryptographic primitives

C Easttom - 2018 IEEE 8th Annual Computing and …, 2018 - ieeexplore.ieee.org
Symmetric ciphers are widely used for a variety of security purposes. These cryptographic
primitives are ubiquitous. The primary source of non-linearity in any symmetric cryptographic …

Heuristic methods of hill climbing of cryptographic boolean functions

I Moskovchenko, M Pastukhov… - … and Technology (PIC …, 2018 - ieeexplore.ieee.org
In this article, heuristic methods of hill climbing for cryptographic Boolean functions satisfying
the required properties of balance, nonlinearity, autocorrelation, and other stability indicators …