搜索结果: 1-15 共查到“S-boxes”相关记录60条 . 查询时间(0.062 秒)
Artificial intelligence controls robotic arm to pack boxes and cut costs(图)
Artificial intelligence robotic pack boxes cut costs
2019/10/23
An NSF-funded team of computer scientists at Rutgers University used artificial intelligence to control a robotic arm, thereby providing a more efficient way to pack boxes that will save businesses ti...
I am making this work from August 1998 available for historical reasons. It has been cited as an ``unpublished manuscript'' more than two dozen times over the years -- even though it has not been publ...
Examining the Practical Side Channel Resilience of ARX-boxes
ARX side channel correlation attack
2019/4/3
Implementations of ARX ciphers are hoped to have some intrinsic side channel resilience owing to the specific choice of cipher components: modular addition (A), rotation (R) and exclusive-or (X). Prev...
SoK: Peigen -- a Platform for Evaluation, Implementation, and Generation of S-boxes
S-box Survey Design criteria
2019/3/1
In this paper, a platform named PEIGEN is presented to evaluate security, find efficient software/hardware implementations, and generate cryptographic S-boxes. Continuously developed for decades, S-bo...
Linearly equivalent S-boxes and the Division Property
Cryptanalysis Division Property RECTANGLE
2019/2/27
Division property is a new cryptanalysis method introduced by Todo at Eurocrypt'15 that proves to be very efficient on block ciphers and stream ciphers. It can be viewed as a generalization or a more ...
Modeling Power Efficiency of S-boxes Using Machine Learning
Power Efficiency Optimal S-box Dynamic power
2019/2/26
In the era of lightweight cryptography, designing cryptographically good and power efficient 4x4 S-boxes is a challenging problem. While the optimal cryptographic properties are easy to determine, ver...
Lightweight and Side-channel Secure 4x4 S-Boxes from Cellular Automata Rules
Lightweight Block Ciphers Side-channels
2018/11/16
This work focuses on side-channel resilient design strategies for symmetric-key cryptographic primitives targeting lightweight applications. In light of NIST's lightweight cryptography project, design...
Constructing TI-friendly Substitution Boxes using Shift-Invariant Permutations
Shift-invariant Threshold implementation Sbox
2018/11/7
The threat posed by side channels requires ciphers that can be efficiently protected in both software and hardware against such attacks. In this paper, we proposed a novel Sbox construction based on i...
4-bit crypto S-boxes: Generation with irreducible polynomials over Galois field GF(24) and cryptanalysis
public-key cryptography EPs
2018/6/13
4-bit crypto S-boxes play a significant role in encryption and decryption of many cipher algorithms from last 4 decades. Generation and cryptanalysis of generated 4-bit crypto S-boxes is one of the ma...
A review of cryptographic properties of S-boxes with Generation and Analysis of crypto secure S-boxes
AES BFs
2018/5/11
In modern as well as ancient ciphers of public key cryptography, substitution boxes find a permanent seat. Generation and cryptanalysis of 4-bit as well as 8-bit crypto S-boxes is of utmost importance...
Spectral-linear and spectral-differential methods for generating S-boxes having almost optimal cryptographic parameters
s-box substitution involutory substitution
2018/4/25
S-boxes are important parts of modern ciphers. To construct S-boxes having cryptographic parameters close to optimal is an unsolved problem at present time. In this paper some new methods for generati...
Constructions of S-boxes with uniform sharing
S-box constructions Threshold implementations Shannon's expansion
2018/1/29
In this paper we focus on S-box constructions. We consider the uniformity property of an S-box which plays an important role in Threshold Implementations (TI). Most papers so far have studied TI shari...
Higher Order Side-Channel Attacks Resilient S-boxes
S-box construction Genetic algorithms Higher-order side-channel analysis
2018/1/12
Masking and hiding schemes represent a well-researched and successful option to follow when considering side-channel countermeasures. Still, such measures increase the implementation cost in term of p...
A Review of Existing 4-bit Crypto S-box cryptanalysis Techniques and Two New Techniques with 4-bit Boolean Functions for Cryptanalysis of 4-bit Crypto S-boxes
public-key cryptography BFs
2017/12/1
4-bit Linear Relations play an important role in Cryptanalysis of 4-bit Bijective Crypto S-boxes. 4-bit finite differences also a major part of cryptanalysis of 4-bit substitution boxes. Count of exis...
The design of Substitution Boxes (S-boxes) with good cryptographic properties represents an interesting problem. In this paper, we investigate how to evolve cellular automata (CA) rules that can be th...