Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDMA_2019_12_a31, author = {S. M. Komissarov}, title = {On algorithmic implementation of 16-bit {S-boxes} with {ARX} and {Butterfly} structures}, journal = {Prikladnaya Diskretnaya Matematika. Supplement}, pages = {101--107}, publisher = {mathdoc}, number = {12}, year = {2019}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDMA_2019_12_a31/} }
TY - JOUR AU - S. M. Komissarov TI - On algorithmic implementation of 16-bit S-boxes with ARX and Butterfly structures JO - Prikladnaya Diskretnaya Matematika. Supplement PY - 2019 SP - 101 EP - 107 IS - 12 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/PDMA_2019_12_a31/ LA - ru ID - PDMA_2019_12_a31 ER -
S. M. Komissarov. On algorithmic implementation of 16-bit S-boxes with ARX and Butterfly structures. Prikladnaya Diskretnaya Matematika. Supplement, no. 12 (2019), pp. 101-107. http://geodesic.mathdoc.fr/item/PDMA_2019_12_a31/
[1] Menyachikhin A., “Spectral-linear and spectral-difference methods for generating cryptographically strong S-boxes”, CTCrypt Preproc. (Yaroslavl, 2016), 232–252 https://mjos.fi/doc/rus/CTCrypt2016Preproceedings.pdf
[2] Fomichev V. M., Lolich D. M., Yuzbashev A. V., “Algoritmicheskaya realizatsiya s-boksov na osnove modifitsirovannykh additivnykh generatorov”, Prikladnaya diskretnaya matematika. Prilozhenie, 2017, no. 10, 102–104
[3] Bobrov V. M., Komissarov S. M., “O svoistvakh dvukh klassov s-boksov razmera 16$\times$16”, Prikladnaya diskretnaya matematika. Prilozhenie, 2018, no. 11, 57–61
[4] Jimenez R. A., Generation of 8-bit s-boxes Having Almost Optimal Cryptographic Properties Using Smaller 4-bit s-boxes and Finite Field Multiplication, Havana University, Institute of Cryptography, Havana, 2017 http://www.cs.haifa.ac.il/õrrd/LC17/paper60.pdf | MR
[5] Fomin D. B., “New Classes of 8-bit Permutations Based on a Butterfly Structure”, CTCrypt (Suzdal, 2018) https://ctcrypt.ru/files/files/2018/09_Fomin.pdf | MR
[6] Wood C. A., Large Substitution Boxes with Efficient Combinational Implementations, Thesis, Rochester Institute of Technology, 2013
[7] Daemen J., Rijmen V., The Design of Rijndael, AES — the Advanced Encryption Standard, Springer Verlag, 2002 | MR | Zbl
[8] AlTawy R., Youssef A. M., “A meet in the middle attack on reduced round Kuznyechik”, IEICE Trans., 98-A (2015), 2194–2198 | DOI | MR
[9] Park S., Sung S.H., Lee S., Lim J., “Improving the upper bound on the maximum differential and the maximum linear hull probability for SPN structures and AES”, LNCS, 2887, 2003, 247–260 | Zbl