S-box, SET, Match: A Toolbox for S-box Analysis
暂无分享,去创建一个
Lejla Batina | Marin Golub | Domagoj Jakobovic | Stjepan Picek | Baris Ege | S. Picek | L. Batina | M. Golub | Baris Ege | D. Jakobović
[1] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.
[2] Emmanuel Prouff,et al. DPA Attacks and S-Boxes , 2005, FSE.
[3] Ramarathnam Venkatesan,et al. Progress in Cryptology - INDOCRYPT 2005, 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings , 2005, INDOCRYPT.
[4] Frédéric Lafitte,et al. Cryptographic Boolean Functions with R , 2011, R J..
[5] Howard M. Heys,et al. A TUTORIAL ON LINEAR AND DIFFERENTIAL CRYPTANALYSIS , 2002, Cryptologia.
[6] Sylvain Guilley,et al. Differential Power Analysis Model and Some Results , 2004, CARDIS.
[7] Joos Vandewalle,et al. Propagation Characteristics of Boolean Functions , 1991, EUROCRYPT.
[8] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[9] Shinsaku Kiyomoto,et al. The rakaposhi Stream Cipher , 2009, ICICS.
[10] Yuliang Zheng,et al. GAC - the Criterion for Global Avalance Characteristics of Cryptographic Functions , 1995, J. Univers. Comput. Sci..
[11] Jianying Zhou,et al. Information and Communications Security , 2013, Lecture Notes in Computer Science.
[12] Peter L. Hammer,et al. Boolean Models and Methods in Mathematics, Computer Science, and Engineering , 2010, Boolean Models and Methods.
[13] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[14] Dengguo Feng,et al. A Fast Implementation of Computing the Transparency Order of S-Boxes , 2008, 2008 The 9th International Conference for Young Computer Scientists.
[15] Kaisa Nyberg,et al. Perfect Nonlinear S-Boxes , 1991, EUROCRYPT.
[16] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[17] Claude Carlet,et al. On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks , 2005, INDOCRYPT.
[18] Frédéric Lafitte,et al. The boolfun Package : Cryptographic Properties of Boolean Functions , 2010 .
[19] Pedro J. Zufiria,et al. A C++ class for analysing Vector Boolean Functions from a cryptographic perspective , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).
[20] Jennifer Seberry,et al. Systematic generation of cryptographically robust S-boxes , 1993, CCS '93.
[21] Andrey Bogdanov,et al. PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.
[22] An Braeken,et al. Cryptographic Properties of Boolean Functions and S-Boxes (Cryptografische eigenschappen van Booleaanse functies en S-Boxen) , 2006 .
[23] Peter L. Hammer,et al. Boolean Models and Methods in Mathematics, Computer Science, and Engineering: Contents , 2010 .
[24] Ingrid Verbauwhede,et al. Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings , 2007, CHES.
[25] Matthew J. B. Robshaw,et al. The Block Cipher Companion , 2011, Information Security and Cryptography.
[26] Markku-Juhani O. Saarinen. Cryptographic Analysis of All 4 x 4 - Bit S-Boxes , 2011, IACR Cryptol. ePrint Arch..
[27] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[28] Mitsuru Matsui,et al. A New Method for Known Plaintext Attack of FEAL Cipher , 1992, EUROCRYPT.
[29] R Core Team,et al. R: A language and environment for statistical computing. , 2014 .
[30] L. Burnett,et al. Heuristic Optimization of Boolean Functions andSubstitution Boxes for Cryptography , 2005 .
[31] Wacek Kusnierczyk. Benchmarking routine for R , 2012 .
[32] Susan Stepney,et al. The design of S-boxes by simulated annealing , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).