Design of S-boxes Defined with Cellular Automata Rules
暂无分享,去创建一个
Nele Mentens | Domagoj Jakobovic | Stjepan Picek | Luca Mariot | Bohan Yang | S. Picek | Bohan Yang | N. Mentens | L. Mariot | D. Jakobovic | D. Jakobović
[1] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[2] Domagoj Jakobovic,et al. Evolving Algebraic Constructions for Designing Bent Boolean Functions , 2016, GECCO.
[3] Joan Daemen,et al. Fast Hashing and Stream Encryption with PANAMA , 1998, FSE.
[4] Claude Carlet,et al. Constructing new APN functions from known ones , 2009, Finite Fields Their Appl..
[5] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[6] Riccardo Poli,et al. A Field Guide to Genetic Programming , 2008 .
[7] Claude Carlet,et al. Boolean Functions for Cryptography and Error-Correcting Codes , 2010, Boolean Models and Methods.
[8] Howard Gutowitz,et al. Cryptography with Dynamical Systems , 1993 .
[9] Joan Boyar,et al. A Small Depth-16 Circuit for the AES S-Box , 2012, SEC.
[10] Guido Bertoni,et al. RadioGatún, a belt-and-mill hash function , 2006, IACR Cryptol. ePrint Arch..
[11] Kaisa Nyberg,et al. On the Construction of Highly Nonlinear Permutations , 1992, EUROCRYPT.
[12] William Millan,et al. Efficient Methods for Generating MARS-Like S-Boxes , 2000, FSE.
[13] Riccardo Poli,et al. Genetic Programming: An Introduction and Tutorial, with a Survey of Techniques and Applications , 2008, Computational Intelligence: A Compendium.
[14] Joos Vandewalle,et al. A New Approach to Block Cipher Design , 1993, FSE.
[15] Joos Vandewalle,et al. Invertible shift-invariant transformations on binary arrays , 1994 .
[16] Joan Daemen,et al. Subterranean: A 600 Mbit/sec cryptographic VLSI chip , 1993, Proceedings of 1993 IEEE International Conference on Computer Design ICCD'93.
[17] Kaisa Nyberg,et al. Perfect Nonlinear S-Boxes , 1991, EUROCRYPT.
[18] Julian Francis Miller,et al. Cartesian Genetic Programming Approach for Generating Substitution Boxes of Different Sizes , 2015, GECCO.
[19] Claude Carlet,et al. Vectorial Boolean Functions for Cryptography , 2006 .
[20] Susan Stepney,et al. The design of S-boxes by simulated annealing , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).
[21] Kyoji Shibutani,et al. Midori: A Block Cipher for Low Energy (Extended Version) , 2015, IACR Cryptol. ePrint Arch..
[22] Guido Bertoni,et al. The Making of KECCAK , 2014, Cryptologia.
[23] D. Richardson,et al. Tessellations with Local Transformations , 1972, J. Comput. Syst. Sci..
[24] Andrey Bogdanov,et al. PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.
[25] Andrey Bogdanov,et al. Exploring Energy Efficiency of Lightweight Block Ciphers , 2015, IACR Cryptol. ePrint Arch..