A Novel Design of Chaos Based S-Box Using Difference Distribution Table (CD S-Box)
暂无分享,去创建一个
[1] Xiaofeng Liao,et al. A method for designing dynamical S-boxes based on discretized chaotic map , 2005 .
[2] L. Kocarev,et al. Logistic map as a block encryption algorithm , 2001 .
[3] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[4] Amitava Banerjee,et al. A Near Optimal S-Box Design , 2007, ICISS.
[5] Babak Sadeghiyan,et al. Finding the differential characteristics of block ciphers with neural networks , 2008, Inf. Sci..
[6] William Millan,et al. How to Improve the Nonlinearity of Bijective S-Boxes , 1998, ACISP.
[7] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[8] A. Akhavan,et al. A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps , 2007 .
[9] Tariq Shah,et al. Construction of S8 Liu J S-boxes and their applications , 2012, Comput. Math. Appl..
[10] Yang Li,et al. A novel method to design S-box based on chaotic map and genetic algorithm , 2012 .
[11] Tor Helleseth,et al. Advances in Cryptology — EUROCRYPT ’93 , 2001, Lecture Notes in Computer Science.
[12] M. N. Vrahatis,et al. Utilizing Evolutionary Computation Methods for the Design of S-Boxes , 2006, 2006 International Conference on Computational Intelligence and Security.
[13] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[14] K. Aihara,et al. Cryptosystems with discretized chaotic maps , 2002 .
[15] William Millan,et al. Multi-objective optimisation of bijective s-boxes , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).
[16] Ljupco Kocarev,et al. Theory and practice of chaotic cryptography , 2007 .
[17] X. Liao,et al. An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps , 2007 .
[18] Guo Chen,et al. A novel heuristic method for obtaining S-boxes , 2008 .
[19] L. Kocarev. Chaos-based cryptography: a brief overview , 2001 .
[20] Ljupco Kocarev,et al. Cryptographically secure substitutions based on the approximation of mixing maps , 2005, IEEE Transactions on Circuits and Systems I: Regular Papers.
[21] Information Security and Privacy , 1996, Lecture Notes in Computer Science.
[22] Ahmet Bedri Ozer,et al. A method for designing strong S-Boxes based on chaotic Lorenz system , 2010 .
[23] Xiaofeng Liao,et al. A novel method for designing S-boxes based on chaotic maps , 2005 .
[24] Varun Jeoti,et al. Efficient and Simple Method for Designing Chaotic S‐Boxes , 2008 .
[25] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[26] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[27] Susan Stepney,et al. The design of S-boxes by simulated annealing , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).