@article{MVK_2024_15_1_a5,
author = {O. C. Puente and R. F. Leal and R. A. de la Cruz Jim\'enez},
title = {On the {Bit-Slice} representations of some nonlinear bijective transformations},
journal = {Matemati\v{c}eskie voprosy kriptografii},
pages = {97--125},
year = {2024},
volume = {15},
number = {1},
language = {en},
url = {http://geodesic.mathdoc.fr/item/MVK_2024_15_1_a5/}
}
TY - JOUR AU - O. C. Puente AU - R. F. Leal AU - R. A. de la Cruz Jiménez TI - On the Bit-Slice representations of some nonlinear bijective transformations JO - Matematičeskie voprosy kriptografii PY - 2024 SP - 97 EP - 125 VL - 15 IS - 1 UR - http://geodesic.mathdoc.fr/item/MVK_2024_15_1_a5/ LA - en ID - MVK_2024_15_1_a5 ER -
%0 Journal Article %A O. C. Puente %A R. F. Leal %A R. A. de la Cruz Jiménez %T On the Bit-Slice representations of some nonlinear bijective transformations %J Matematičeskie voprosy kriptografii %D 2024 %P 97-125 %V 15 %N 1 %U http://geodesic.mathdoc.fr/item/MVK_2024_15_1_a5/ %G en %F MVK_2024_15_1_a5
O. C. Puente; R. F. Leal; R. A. de la Cruz Jiménez. On the Bit-Slice representations of some nonlinear bijective transformations. Matematičeskie voprosy kriptografii, Tome 15 (2024) no. 1, pp. 97-125. http://geodesic.mathdoc.fr/item/MVK_2024_15_1_a5/
[1] Avraamova O. D., Fomin D. B., Serov V. A., Smirnov A. V., Shokov V. N., “A compact Bit-Sliced representation of Kuznyechik S-Box”, Matematicheskie voprosy kriptografii, 12:2 (2021), 21–38 | DOI | MR | Zbl
[2] Barreto P.S.L.M., Rijmen V., “The Whirlpool hashing function”, First open NESSIE Workshop (Leuven, Belgium, 2000), v. 13, 14
[3] Biham Eli, “A fast new DES implementation in software”, FSE 1997, Lect. Notes Comput. Sci., 1267, 1997, 260–272 | DOI | Zbl
[4] Biryukov A., Perrin L., Udovenko A., “Reverse engineering the S-Box of streebog, kuznyechik and STRIBOBr1”, EUROCRYPT 2016, Lect. Notes Comput. Sci., 9665, 2016, 372–402 | DOI | MR | Zbl
[5] Boyar J., Peralta R., “A new combinational logic minimization technique with applications to cryptology”, SEA 2010, Lect. Notes Comput. Sci., 6049, 2010, 178–189 | DOI
[6] Carlet C., Boolean Functions for Cryptography and Coding Theory, Cambridge Univ. Press, Cambridge, 2021 | DOI | MR | Zbl
[7] CircuitVerse simulator, 2023 } {\tt https://circuitverse.org
[8] Dansarie M., “sboxgates: A program for finding low gate count implementations of S-Boxes”, J. Open Source Software, 6(62) (2021), 2946 | DOI
[9] de la Cruz-Jiménez R. A., “Generation of 8-bit S-Boxes having almost optimal cryptographic properties using smaller 4-bit S-Boxes and finite field multiplication”, LATINCRYPT 2017, Lect. Notes Comput. Sci., 11368, 2017, 191–206 | DOI | MR
[10] de la Cruz-Jiménez R. A., On some methods for constructing almost optimal s-boxes and their resilience against side-channel attacks, Cryptology ePrint Archive, Report 2018/618, 2018 http://eprint.iacr.org/2016/493
[11] de la Cruz-Jiménez R. A., “Constructing $8$-bit permutations, $8$-bit involutions and $8$-bit orthomorphisms with almost optimal cryptographic parameters”, Matematicheskie voprosy kriptografii, 12:3 (2021), 89–124 | DOI | MR | Zbl
[12] Dygin D. M., Lavrikov I. V., Marshalko G. B., Rudskoy V. I., Trifonov D. I., Shishkin V. A., “On a new Russian Encryption Standard”, Matematicheskie voprosy kriptografii, 6:2 (2015), 29–34 | DOI | MR | Zbl
[13] Fomin D., Trifonov D., “Computational work for some TU-based permutations”, Current Trends in Cryptology (CTCrypt 2023), 2023 https://ctcrypt.ru/ematerials2023
[14] Ishai Y., Sahai A., Wagner D., “Private circuits: securing hardware against probing attacks”, CRYPTO 2003, Lect. Notes Comput. Sci., 2729, 2003, 463-481 | DOI | MR | Zbl
[15] Knuth D. E., Fascicle 6: Satisfiability, Art of computer programming, 19, Addison-Wesley, Reading, Mass., 2015 | MR
[16] Kwan M., Reducing the gate count of bitslice DES, Cryptology ePrint Archive, Report 2000/051, , 2000 https://eprint.iacr.org/2000/051
[17] Opirskyy I., Sovyn Y., Mykhailova O., “Heuristic method of finding bitliced-description of derivative cryptographic S-Box”, IEEE 16th Int. Conf. Adv. Trends in Radioelectr., Telecomm. Comput. Eng. (TCSET) (Lviv-Slavske, Ukraine, 2022), 104–109
[18] Zhenzhen B. et al., “Peigen - a platform for evaluation, implementation, and generation of S-boxes”, IACR Trans. Symm. Cryptology, 2019:1 (2019), 330–394
[19] PNST 799-2022. Informatsionnye tekhnologii. Kriptograficheskaya zaschita informatsii. Terminy i opredeleniya, Rossiiskii institut standartizatsii, M., 2024