Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDMA_2019_12_a38, author = {D. B. Fomin and D. I. Trifonov}, title = {Hardware implementation of one class of 8-bit permutations}, journal = {Prikladnaya Diskretnaya Matematika. Supplement}, pages = {134--137}, publisher = {mathdoc}, number = {12}, year = {2019}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDMA_2019_12_a38/} }
TY - JOUR AU - D. B. Fomin AU - D. I. Trifonov TI - Hardware implementation of one class of 8-bit permutations JO - Prikladnaya Diskretnaya Matematika. Supplement PY - 2019 SP - 134 EP - 137 IS - 12 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/PDMA_2019_12_a38/ LA - ru ID - PDMA_2019_12_a38 ER -
D. B. Fomin; D. I. Trifonov. Hardware implementation of one class of 8-bit permutations. Prikladnaya Diskretnaya Matematika. Supplement, no. 12 (2019), pp. 134-137. http://geodesic.mathdoc.fr/item/PDMA_2019_12_a38/
[1] Shannon C., “Communication theory of secrecy systems”, Bell System Technical J., 1949, no. 28, 656–715 | DOI | MR | Zbl
[2] Rebeiro C., Selvakumar D., Devi A. S. L., “Bitslice implementation of AES”, Cryptology and Network Security, 2006, 203–212 | DOI | Zbl
[3] Boss E., Grosso V., Tim Güneysu T., et al., “Strong 8-bit sboxes with efficient masking in hardware”, J. Cryptographic Engineering, 7:2 (2017), 149–165 | DOI
[4] Kutzner S., Nguyen P. H., and Poschmann A., “Enabling 3-share threshold implementations for all 4-bit s-boxes”, LNCS, 8565, 2013, 91–108 | MR
[5] Canteaut A., Duval S., Leurent G., Construction of lightweight s-boxes using Feistel and MISTY structures (full version), Cryptology ePrint Archive, No 2015(711), 2015 | MR
[6] Lim C. H., CRYPTON: A New 128-bit Block Cipher — Specification and Analysis, , 1998 http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.52.5771
[7] Gérard B., Grosso V., Naya-Plasencia M., Standaert F.-X., “Block ciphers that are easier to mask: How far can we go?”, LNCS, 8086, 2013, 383–399 | Zbl
[8] Matsui M., “New block encryption algorithm MISTY”, LNCS, 1267, 1997, 54–68 | Zbl
[9] Grosso V., Leurent G., Standaert F.-X., Varici K., “Ls-designs: Bitslice encryption for efficient masked software implementations”, LNCS, 8540, 2014, 18–37
[10] Standaert F.-X., Piret G., Rouvroy G., et al., “ICEBERG: An involutional cipher efficient for block encryption in reconfigurable hardware”, LNCS, 3017 (2004), 279–299 | Zbl
[11] Rijmen V., Barreto P., The Khazad Legacy-Level Block Cipher, , 2018 https://www.researchgate.net/publication/228924670_The_Khazad_legacy-level_block_cipher
[12] Lim C.-H., “A revised version of Crypton — Crypton v1.0”, LNCS, 1636, 1999, 31–45 | MR | Zbl
[13] Stallings W., “The Whirlpool secure hash function”, Cryptologia, 30:1 (2006), 55–67 | DOI | Zbl
[14] Perrin L., Udovenko A., Biryukov A., Cryptanalysis of a theorem: Decomposing the only known solution to the big APN problem (full version), Cryptology ePrint Archive, No 2016(539), 2016 | MR
[15] De la Cruz Jiménez R. A., On some methods for constructing almost optimal s-boxes and their resilience against side-channel attacks, Cryptology ePrint Archive, No 2018(618), 2018
[16] Fomin D., “New classes of 8-bit permutations based on a butterfly structure”, CTCrypt'18, 2018 https://ctcrypt.ru/files/files/2018/09_Fomin.pdf | MR
[17] Fomin D., “On the way of constructing $2n$-bit permutations from $n$-bit ones”, CTCrypt'19, 2019 (to appear)
[18] Fomin D. B., “O podkhodakh k postroeniyu nizkoresursnykh nelineinykh preobrazovanii”, Obozrenie prikladnoi i promyshlennoi matematiki, 25:4 (2018), 379–381