Ara
Toplam kayıt 9, listelenen: 1-9
On the mixcolumns linear transformation used in AES cipher
(2010)
AES block cipher includes a linear transformation called MixColumns which transforms 32-bit input to 32-bit output. This transformation has the property that makes linear and differential attacks harder. In this study, we ...
On the Construction of 20 x 20 and 24 x 24 Binary Matrices with Good Implementation Properties for Lightweight Block Ciphers and Hash Functions
(Hindawi Ltd, 2014)
We present an algebraic construction based on state transform matrix (companion matrix) for n x n (where n + 2(k), k being a positive integer) binary matrices with high branch number and low number of fixed points. We also ...
Algebraic construction of cryptographically good binary linear transformations
(Wiley-Hindawi, 2014)
[Abstract Not Available]
On the algebraic construction of cryptographically good 32 x 32 binary linear transformations
(Elsevier Science Bv, 2014)
Binary linear transformations (also called binary matrices) have matrix representations over GF(2). Binary matrices are used as diffusion layers in block ciphers such as Camellia and ARIA. Also, the 8 x 8 and 16 x 16 binary ...
Force Feedback Simulation Design for Fruit Hardness
(Ieee, 2020)
Hardness value is one of the decisive criteria for fruit harvest period. It is important for harvest yield that the harvesting personnel knows the differences of this value with respect to the fruits. Especially in industrial ...
A new involutory 4×4 MDS matrix for the AES-like block ciphers
(2011)
Maximum Distance Separable (MDS) codes are used as diffusion layers in the design of the well known block ciphers like the Advanced Encryption Standard (AES) and Khazad. The reason for the use of MDS codes in the design ...
Classifying 8-bit to 8-bit S-boxes based on power mappings from the point of DDT and LAT distributions
(Springer-Verlag Berlin, 2008)
S-boxes are vital elements in the design of symmetric ciphers. To date, the techniques for the construction of S-boxes have included pseudo-random generation, finite field inversion, power mappings and heuristic techniques. ...
On the algebraic expression of the AES S-box like S-boxes
(2010)
In the literature, there are several proposed block ciphers like AES, Square, Shark and Hierocrypt which use S-boxes that are based on inversion mapping over a finite field. Because of the simple algebraic structure of ...
Energy Consumption Analysis of Lightweight Cryptographic Algorithms That Can Be Used in the Security of Internet of Things Applications
(Wiley-Hindawi, 2020)
The Internet of Things (IoT) has begun to acquire place in our lives quietly and gradually thanks to the presence of wireless communication systems. An increasing number of M2M applications, such as smart meters, healthcare ...