Generating A New S-Box Inspired by
暂无分享,去创建一个
Zuriati Ahmad Zukarnain | Ramlan Mahmod | Nur Izura Udzir | Auday H. Al-Wattar | Z. Zukarnain | R. Mahmod | N. Udzir
[1] Kazys Kazlauskas,et al. Key-Dependent S-Box Generation in AES Block Cipher System , 2009, Informatica.
[2] Onur Koçak,et al. Cryptographic Randomness Testing of Block Ciphers and Hash Functions , 2010, IACR Cryptol. ePrint Arch..
[3] Magdy Saeb,et al. A DNA-based implementation of YAEA encryption algorithm , 2006, Computational Intelligence.
[4] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[5] Lejla Batina,et al. A Very Compact "Perfectly Masked" S-Box for AES , 2008, ACNS.
[6] Mona Sabry,et al. Three Reversible Data Encoding Algorithms based on DNA and Amino Acids' Structure , 2012 .
[7] H. Feistel. Cryptography and Computer Privacy , 1973 .
[8] John H. Reif,et al. DNA-based Cryptography , 1999, Aspects of Molecular Computing.
[9] Vasilios Katos. A randomness test for block ciphers , 2005, Appl. Math. Comput..
[10] Susan Stepney,et al. The design of S-boxes by simulated annealing , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).
[11] Xiaofeng Liao,et al. A novel method for designing S-boxes based on chaotic maps , 2005 .
[12] Minh-Triet Tran,et al. Gray S-Box for Advanced Encryption Standard , 2008, 2008 International Conference on Computational Intelligence and Security.
[13] Lawrence E. Bassham,et al. Randomness Testing of the Advanced Encryption Standard Finalist Candidates , 2000 .
[14] Péter L. Erdös,et al. Exordium for DNA Codes , 2003, J. Comb. Optim..
[15] Stafford E. Tavares,et al. On the Design of S-Boxes , 1985, CRYPTO.
[16] Bo Zhu,et al. Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions , 2016, Cryptography and Communications.
[17] Guo Chen,et al. A novel heuristic method for obtaining S-boxes , 2008 .
[18] Qiang Zhang,et al. A RGB image encryption algorithm based on DNA encoding and chaos map , 2009, Comput. Electr. Eng..
[19] S.V. Kartalopoulos,et al. DNA-inspired cryptographic method in optical communications, authentication and data mimicking , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[20] David C. Torney,et al. Repetitive DNA Sequences: Some Considerations for Simple Sequence Repeats , 1993, Comput. Chem..
[21] Gregor Leander,et al. On the Classification of 4 Bit S-Boxes , 2007, WAIFI.
[22] Carlisle M. Adams,et al. Good S-Boxes Are Easy To Find , 1989, CRYPTO.
[23] Melek D. Yücel,et al. Avalanche and Bit Independence Properties for the Ensembles of Randomly Chosen n \times n S-Boxes , 2001 .
[24] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[25] J.L. Smith,et al. Some cryptographic techniques for machine-to-machine data communications , 1975, Proceedings of the IEEE.
[26] A Leier,et al. Cryptography with DNA binary strands. , 2000, Bio Systems.
[27] Stafford E. Tavares,et al. Constructing Large Cryptographically Strong S-boxes , 1992, AUSCRYPT.
[28] Olga Tornea,et al. DNA Cryptographic Algorithms , 2009 .
[29] Yanfeng Wang,et al. An encryption scheme using DNA technology , 2008, 2008 3rd International Conference on Bio-Inspired Computing: Theories and Applications.
[30] Harsh Dhaka,et al. DNA based Cryptography: an Approach to Secure Mobile Networks , 2010 .