Heuristic Approach for Nonlinear n × n (3 ≤ n ≤ 7) Substitution-Boxes
暂无分享,去创建一个
[1] Iqtadar Hussain,et al. A novel design for the construction of safe S-boxes based on TDERC sequence , 2015 .
[2] Musheer Ahmad,et al. A Chaos Based Method for Efficient Cryptographic S-box Design , 2013, SSCC.
[3] Shujun Li,et al. Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding , 2001, IMACC.
[4] Dragan Lambić,et al. A novel method of S-box design based on chaotic map and composition method , 2014 .
[5] William Millan,et al. How to Improve the Nonlinearity of Bijective S-Boxes , 1998, ACISP.
[6] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[7] Tor Helleseth,et al. On the covering radius of binary codes (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[8] Nadia Nedjah,et al. Designing substitution boxes for secure ciphers , 2007 .
[9] Minh-Triet Tran,et al. Gray S-Box for Advanced Encryption Standard , 2008, 2008 International Conference on Computational Intelligence and Security.
[10] Tariq Shah,et al. Literature survey on nonlinear components and chaotic nonlinear components of block ciphers , 2013, Nonlinear Dynamics.
[11] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[12] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[13] Musheer Ahmad,et al. A Simple and Efficient Key-Dependent S-Box Design Using Fisher-Yates Shuffle Technique , 2014, SNDS.
[14] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[15] Nicholas J. Patterson,et al. The covering radius of the (215, 16) Reed-Muller code is at least 16276 , 1983, IEEE Trans. Inf. Theory.
[16] Christopher A. Wood. Large substitution boxes with efficient combinational implementations , 2013 .
[17] M. N. Vrahatis,et al. Utilizing Evolutionary Computation Methods for the Design of S-Boxes , 2006, 2006 International Conference on Computational Intelligence and Security.
[18] Musheer Ahmad,et al. PWLCM-Based Random Search for Strong Substitution-Box Design , 2016 .
[19] Musheer Ahmad,et al. Design of chaotic neural network based method for cryptographic substitution box , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).
[20] Yang Li,et al. A novel method to design S-box based on chaotic map and genetic algorithm , 2012 .
[21] Musheer Ahmad,et al. Efficient Cryptographic Substitution Box Design Using Travelling Salesman Problem and Chaos , 2017, ArXiv.
[22] H. Feistel. Cryptography and Computer Privacy , 1973 .
[23] Musheer Ahmad,et al. Designing chaos based strong substitution box , 2015, 2015 Eighth International Conference on Contemporary Computing (IC3).
[24] Musheer Ahmad,et al. A Novel Ant Colony Optimization Based Scheme for Substitution Box Design , 2015 .
[25] William Millan,et al. Multi-objective optimisation of bijective s-boxes , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).
[26] Chung-Huang Yang,et al. On the Linear Consistency Test (LCT) in Cryptanalysis with Applications , 1989, CRYPTO.