Analysis of Development of Dynamic S-Box Generation
暂无分享,去创建一个
[1] David A. Wagner,et al. The Boomerang Attack , 1999, FSE.
[2] Vincent Rijmen,et al. The Block Cipher Square , 1997, FSE.
[3] Josef Pieprzyk,et al. Cryptanalysis of Block Ciphers with Overdefined Systems of Equations , 2002, ASIACRYPT.
[4] C. Sanchez-Avila,et al. The Rijndael block cipher (AES proposal) : a comparison with DES , 2001, Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No.01CH37186).
[5] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[6] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[7] Talaat A. Elgarf,et al. Dynamic AES-128 with Key-Dependent S-box , 2013 .
[8] Balajee Maram,et al. Evaluation of Key Dependent S-Box Based Data Security Algorithm using Hamming Distance and Balanced Output , 2016 .
[9] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[10] I. Abd-ElGhafar,et al. Generation of AES Key Dependent S-Boxes using RC4 Algorithm , 2009 .
[11] Dalia H. El-Kamchouchi,et al. Strongest AES with S-Boxes Bank and Dynamic Key MDS Matrix (SDK-AES) , 2013 .
[12] Julia Juremi,et al. ENHANCING ADVANCED ENCRYPTION STANDARD S-BOX GENERATION BASED ON ROUND KEY , 2012 .
[13] Tianyong Ao,et al. Construction of High Quality Key-dependent S-boxes , 2017 .
[14] N KrishnamurthyG,et al. Making AES Stronger: AES with Key Dependent S-Box , 2008 .
[15] Kooroush Manochehri,et al. A Novel Method for Designing S-Boxes Based on Chaotic Logistic Maps Using Cipher Key , 2013 .
[16] Kazys Kazlauskas,et al. An Algorithm for Key-Dependent S-Box Generation in Block Cipher System , 2015, Informatica.
[17] Dirk Fox,et al. Advanced Encryption Standard (AES) , 1999, Datenschutz und Datensicherheit.
[18] N. Jeyanthi,et al. Pure Dynamic S-box Construction , 2016 .
[19] Abdennaceur Kachouri,et al. On dynamic chaotic S-BOX , 2009, 2009 Global Information Infrastructure Symposium.
[20] P. Mroczkowski,et al. Generating Pseudorandom S-Boxes - a Method of Improving the Security of Cryptosystems Based on Block Ciphers , 2009 .
[21] Réjane Forré,et al. The Strict Avalanche Criterion: Spectral Properties of Boolean Functions and an Extended Definition , 1988, CRYPTO.
[22] Lars R. Knudsen,et al. The Interpolation Attack on Block Ciphers , 1997, FSE.
[23] Kazys Kazlauskas,et al. Key-Dependent S-Box Generation in AES Block Cipher System , 2009, Informatica.
[24] Jie Cui,et al. AN IMPROVED AES S-BOX AND ITS PERFORMANCE ANALYSIS , 2011 .
[25] John B. Kam,et al. Structured Design of Substitution-Permutation Encryption Networks , 1979, IEEE Transactions on Computers.
[26] Stafford E. Tavares,et al. On the Design of S-Boxes , 1985, CRYPTO.
[27] Roman Oliynykov,et al. A Method For Generation Of High-Nonlinear S-Boxes Based On Gradient Descent , 2013, IACR Cryptol. ePrint Arch..
[28] K AdiNarayanaReddy. Secure Linear Transformation Based Cryptosystem using Dynamic Byte Substitution , 2014 .