@article{MVK_2014_5_2_a7,
author = {O. V. Kazymyrov and V. N. Kazymyrova and R. V. Oliynykov},
title = {A~method for generation of high-nonlinear {S-boxes} based on gradient descent},
journal = {Matemati\v{c}eskie voprosy kriptografii},
pages = {71--78},
year = {2014},
volume = {5},
number = {2},
language = {en},
url = {http://geodesic.mathdoc.fr/item/MVK_2014_5_2_a7/}
}
TY - JOUR AU - O. V. Kazymyrov AU - V. N. Kazymyrova AU - R. V. Oliynykov TI - A method for generation of high-nonlinear S-boxes based on gradient descent JO - Matematičeskie voprosy kriptografii PY - 2014 SP - 71 EP - 78 VL - 5 IS - 2 UR - http://geodesic.mathdoc.fr/item/MVK_2014_5_2_a7/ LA - en ID - MVK_2014_5_2_a7 ER -
O. V. Kazymyrov; V. N. Kazymyrova; R. V. Oliynykov. A method for generation of high-nonlinear S-boxes based on gradient descent. Matematičeskie voprosy kriptografii, Tome 5 (2014) no. 2, pp. 71-78. http://geodesic.mathdoc.fr/item/MVK_2014_5_2_a7/
[1] Crama Y., Hammer P. L., Boolean Models and Methods in Mathematics, Computer Science, and Engineering, Encyclopedia of Mathematics and its Applications, Cambridge University Press, 2010 | MR | Zbl
[2] Oliynykov R., Kazymyrov O., “An impact of S-box Boolean function properties to strength of modern symmetric block ciphers”, Radio Engineering, 166, Kharkiv, 2011, 11–17
[3] Rijmen V., Cryptanalysis and design of iterated block ciphers, PhD Thesis, University of Leuven, 1997
[4] Kazymyrov O., Oliynykov R., Vectorial Boolean functions application for substitutions generation for symmetric cryptographic transformation, Applied Radio Electronics, Kharkiv, 2012 (In Russian)
[5] Budaghyan L., Kazymyrov O., “Verification of restricted EA-equivalence for vectorial Boolean functions”, Lect. Notes Comput. Sci., 7369, 2012, 108–118 | DOI | MR | Zbl
[6] Tesa Ř. P., “A new method for generating high non-linearity S-boxes”, Radioengineering, 19:1 (2010), 23–26
[7] Izbenko Y., Kovtun V., Kuznetsov A., The design of Boolean functions by modified hill climbing method, , 10.03.2013 http://eprint.iacr.org/2008/111.pdf
[8] Millan W., Clark A., Dawson E., “Boolean function design using hill climbing methods”, Lect. Notes Comput. Sci., 1587, 1999, 1–11 | DOI | Zbl
[9] Daemen J., Rijmen V., AES proposal: Rijndael, , 10.03.2013 http://csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf
[10] Logachev O. A., Salnikov A. A., Yaschenko V. V., Boolean functions in coding theory and cryptology, MCCME, Moscow, 2004 (In Russian) | MR
[11] Yu Y., Wang M., Li Y., Constructing differential 4-uniform permutations from know ones, , 10.03.2013 http://eprint.iacr.org/2011/047.pdf