Voir la notice de l'article provenant de la source Library of Science
@article{IJAMCS_2010_20_2_a14, author = {Bucholc, K. and Chmiel, K. and Grocholewska-Czury{\l}o, A. and Idzikowska, E. and Janicka-Lipska, I. and Stok{\l}osa, J.}, title = {Scalable {PP-1} block cipher}, journal = {International Journal of Applied Mathematics and Computer Science}, pages = {401--411}, publisher = {mathdoc}, volume = {20}, number = {2}, year = {2010}, language = {en}, url = {http://geodesic.mathdoc.fr/item/IJAMCS_2010_20_2_a14/} }
TY - JOUR AU - Bucholc, K. AU - Chmiel, K. AU - Grocholewska-Czuryło, A. AU - Idzikowska, E. AU - Janicka-Lipska, I. AU - Stokłosa, J. TI - Scalable PP-1 block cipher JO - International Journal of Applied Mathematics and Computer Science PY - 2010 SP - 401 EP - 411 VL - 20 IS - 2 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/IJAMCS_2010_20_2_a14/ LA - en ID - IJAMCS_2010_20_2_a14 ER -
%0 Journal Article %A Bucholc, K. %A Chmiel, K. %A Grocholewska-Czuryło, A. %A Idzikowska, E. %A Janicka-Lipska, I. %A Stokłosa, J. %T Scalable PP-1 block cipher %J International Journal of Applied Mathematics and Computer Science %D 2010 %P 401-411 %V 20 %N 2 %I mathdoc %U http://geodesic.mathdoc.fr/item/IJAMCS_2010_20_2_a14/ %G en %F IJAMCS_2010_20_2_a14
Bucholc, K.; Chmiel, K.; Grocholewska-Czuryło, A.; Idzikowska, E.; Janicka-Lipska, I.; Stokłosa, J. Scalable PP-1 block cipher. International Journal of Applied Mathematics and Computer Science, Tome 20 (2010) no. 2, pp. 401-411. http://geodesic.mathdoc.fr/item/IJAMCS_2010_20_2_a14/
[1] Bertoni, G., Breveglieri, L., Koren, I., Maistri, P. and Piuri, V. (2003a). Concurrent fault detection in a hardware implementation of the RC5 encryption algorithm, Proceedings of the IEEE International Conference on Application-Specific Systems, Architectures and Processors, The Hague, The Netherlands, pp. 410-419.
[2] Bertoni, G., Breveglieri, L., Koren, I., Maistri, P. and Piuri, V. (2003b). Error analysis and detection procedures for a hardware implementation of the advanced encryption standard, IEEE Transactions on Computers 52: 492-505.
[3] Biham, E. and Shamir, A. (1992). Differential cryptanalysis of the full 16-round DES, in E. F. Brickell (Ed.), CRYPTO, Lecture Notes in Computer Science, Vol. 740, Springer, Heidelberg, pp. 487-496.
[4] Biryukov, A. (2003). Analysis of involutional ciphers: Khazad and Anubis, in T. Johansson (Ed.), Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers, Lecture Notes in Computer Science, Vol. 2887, Springer, New York, NY, pp. 45-53.
[5] Bucholc, K. and Idzikowska, E. (2007). Analysis of the influence of errors on the encryption and decryption in PP-1 block cipher, Studia z Automatyki i Informatyki 32: 17-22.
[6] Chmiel, K. (2006a). Distribution of the best nonzero differential and linear approximations of S-box functions, Journal of Telecommunications and Information Technology 3: 8-13.
[7] Chmiel, K. (2006b). Intermediate evaluation of block ciphers, Proceedings of the 13th International Multi-Conference on Advanced Computer Systems ACS 2006, Międzyzdroje, Poland, Vol. 1, pp. 331-342.
[8] Chmiel, K. (2006c). On differential and linear approximation of S-box functions, Biometrics, Computer Security Systems and Artificial Intelligence Applications, New York, NY, USA, pp. 111-120.
[9] Chmiel, K., Grocholewska, A., Socha, P. and Stoklosa, J. (2008a). Involutional block cipher for limited resources, Global Communications Conference-GLOBECOM, New Orleans, LA, USA, pp. 1852-1856.
[10] Chmiel, K., Grocholewska, A., Socha, P. and Stoklosa, J. (2008b). Scalable cipher for limited resources, Polish Journal of Environmental Studies 17(4C): 371-377.
[11] Courtois, N. and Pieprzyk, J. (2002). Cryptanalysis of block ciphers with overdefined systems of equations, in Y. Zheng (Ed.), ASIACRYPT, Lecture Notes in Computer Science, Vol. 2501, Springer, Berlin/Heidelberg, pp. 267-287.
[12] Daemen, J. and Rijmen, V. (1999). AES proposal: Rijndael, Proceedings of the First Advanced Encryption Standard Candidate Conference, Ventura, CA, USA.
[13] Fuller, J. and Millan, W. (2002). On linear redundancy in the AES S-Box, Cryptology ePrint Archive, http://eprint.iacr.org.
[14] Fuller, J. and Millan, W. (2003). Linear redundancy in S-boxes, in T. Johansson (Ed.) Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers, Lecture Notes in Computer Science, Vol. 2887, Springer-Verlag, New York, NY, pp. 74-86.
[15] Idzikowska, E. and Bucholc, K. (2007). Concurrent error detection in S-boxes, International Journal of Computer Science and Applications 4(1): 27-32.
[16] Johansson, T. (Ed.) (2003). Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers, Lecture Notes in Computer Science, Vol. 2887, Springer-Verlag, New York, NY.
[17] NIST (2005). Statistical test suite (version 1.8), http://csrc.nist.gov/rng/rng2.html .
[18] Socha, P. (2008). Scalable PP-1 block cipher-Implementation, Report No. 558, Poznań University of Technology, Institute of Control and Information Engineering, Poznań.