Boolean functions for cryptography and coding theory

C Carlet - 2021 - books.google.com
Boolean functions are essential to systems for secure and reliable communication. This
comprehensive survey of Boolean functions for cryptography and coding covers the whole …

[PDF][PDF] Cryptographic algorithms: a review of the literature, weaknesses and open challenges

Y Salami, V Khajevand, E Zeinali - J. Comput. Robot, 2023 - journals.iau.ir
Abstract Information security has become an important issue in the modern world due to its
increasing popularity in Internet commerce and communication technologies such as the …

Chaos and cryptography: block encryption ciphers based on chaotic maps

G Jakimoski, L Kocarev - … transactions on circuits and systems i …, 2001 - ieeexplore.ieee.org
This paper is devoted to the analysis of the impact of chaos-based techniques on block
encryption ciphers. We present several chaos based ciphers. Using the well-known …

[图书][B] Pengantar ilmu kriptografi: teori analisis & implementasi

D Ariyus - 2008 - books.google.com
Masalah keamanan komputer dan kerahasiaan data merupakan sesuatu yang sangat
penting dalam era informasi ini. Keamanan data pada komputer tidak hanya tergantung …

[PDF][PDF] Twofish: A 128-bit block cipher

B Schneier, J Kelsey, D Whiting, D Wagner… - NIST AES …, 1998 - karlin.mff.cuni.cz
Twofish is a 128-bit block cipher that accepts a variable-length key up to 256 bits. The cipher
is a 16-round Feistel network with a bijective F function made up of four key-dependent 8-by …

[图书][B] Bent functions: results and applications to cryptography

N Tokareva - 2015 - books.google.com
Bent Functions: Results and Applications to Cryptography offers a unique survey of the
objects of discrete mathematics known as Boolean bent functions. As these maximal …

[图书][B] The block cipher companion

LR Knudsen, M Robshaw - 2011 - books.google.com
Block ciphers encrypt blocks of plaintext, messages, into blocks of ciphertext under the
action of a secret key, and the process of encryption is reversed by decryption which uses …

Side channel cryptanalysis of product ciphers

J Kelsey, B Schneier, D Wagner, C Hall - Computer Security—ESORICS …, 1998 - Springer
Building on the work of Kocher [Koc96], we introduce the notion of side-channel
cryptanalysis: cryptanalysis using implementation data. We discuss the notion of side …

Related-key cryptanalysis of 3-way, biham-des, cast, des-x, newdes, rc2, and tea

J Kelsey, B Schneier, D Wagner - International Conference on Information …, 1997 - Springer
We present new related-key attacks on the block ciphers 3WAY, Biham-DES, CAST, DES-X,
NewDES, RC2, and TEA. Differential related-key attacks allow both keys and plaintexts to be …

[PDF][PDF] MARS-a candidate cipher for AES

C Burwick, D Coppersmith, E D'Avignon… - NIST AES …, 1998 - cryptosoft.de
We describe MARS, a shared-key (symmetric) block cipher supporting 128-bit blocks and
variable key size. MARS is designed to take advantage of the powerful operations supported …