메뉴 건너뛰기




Volumn 23, Issue 2, 2005, Pages 413-419

A novel method for designing S-boxes based on chaotic maps

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; BOOLEAN FUNCTIONS; CRYPTOGRAPHY; NUMERICAL METHODS; SET THEORY; VECTORS;

EID: 4243129231     PISSN: 09600779     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.chaos.2004.04.023     Document Type: Article
Times cited : (245)

References (13)
  • 1
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Shannon C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 28:1949;656-715.
    • (1949) Bell Syst. Tech. J. , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 3
    • 85020558749 scopus 로고
    • An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks
    • Springer-Verlag
    • Dawson M., Tavares S.E. An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks. Advances in Cryptology: Proceedings of Eurocrypt'91. 1991;352-367 Springer-Verlag.
    • (1991) Advances in Cryptology: Proceedings of Eurocrypt'91 , pp. 352-367
    • Dawson, M.1    Tavares, S.E.2
  • 5
    • 0008238518 scopus 로고
    • The strict avalanche criterion: Spectral properties of Boolean functions and an extended definition
    • Berlin: Springer-Verlag
    • Forre R. The strict avalanche criterion: spectral properties of Boolean functions and an extended definition. Advances in Cryptology: Proceedings of CRYPTO'88. 1989;Springer-Verlag, Berlin.
    • (1989) Advances in Cryptology: Proceedings of CRYPTO'88
    • Forre, R.1
  • 7
    • 0025530315 scopus 로고
    • The structured design of cryptographically good S-boxes
    • Adams C., Tavares S. The structured design of cryptographically good S-boxes. J. Cryptol. 3(1):1990;27-41.
    • (1990) J. Cryptol. , vol.3 , Issue.1 , pp. 27-41
    • Adams, C.1    Tavares, S.2
  • 8
    • 0031361712 scopus 로고    scopus 로고
    • A method for obtaining cryptographically strong 8 × 8 S-boxes
    • GLOBECOM'97 IEEE
    • Yi X., Cheng S., You X. A method for obtaining cryptographically strong 8. × 8 S-boxes Global Telecommunications Conference. GLOBECOM'97 IEEE. 2(3-8):1997;689-693.
    • (1997) Global Telecommunications Conference , vol.2 , Issue.3-8 , pp. 689-693
    • Yi, X.1    Cheng, S.2    You, X.3
  • 9
    • 0035250017 scopus 로고    scopus 로고
    • Chaos and cryptography: Block encryption ciphers
    • Jakimoski G., Kocarev L. Chaos and cryptography: block encryption ciphers. IEEE Trans. Circuits Syst.-I. 48(2):2001;163-170.
    • (2001) IEEE Trans. Circuits Syst.-I , vol.48 , Issue.2 , pp. 163-170
    • Jakimoski, G.1    Kocarev, L.2
  • 10
    • 0030833521 scopus 로고    scopus 로고
    • Statistics of chaotic binary sequences
    • Kohda T., Tsuneda A. Statistics of chaotic binary sequences. IEEE Trans. Inform. Theory. 43(January):1997;104-112.
    • (1997) IEEE Trans. Inform. Theory , vol.43 , Issue.JANUARY , pp. 104-112
    • Kohda, T.1    Tsuneda, A.2
  • 11
    • 0026397734 scopus 로고
    • Differential cryptanalysis of DES-like cryptosystems
    • Biham E., Shamir A. Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1):1991;3-72.
    • (1991) J. Cryptol , vol.4 , Issue.1 , pp. 3-72
    • Biham, E.1    Shamir, A.2
  • 12
    • 0032089417 scopus 로고    scopus 로고
    • Symmetric ciphers based on two-dimensional chaotic maps
    • Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcat. Chaos. 8(6):1998;1259-1284.
    • (1998) Int. J. Bifurcat. Chaos , vol.8 , Issue.6 , pp. 1259-1284
    • Fridrich, J.1
  • 13
    • 1342306864 scopus 로고    scopus 로고
    • A symmetric image encryption scheme based on 3D chaotic cat maps
    • Chen G., Mao Y., Charles K. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons & Fractals. 21:2003;749-761.
    • (2003) Chaos Solitons & Fractals , vol.21 , pp. 749-761
    • Chen, G.1    Mao, Y.2    Charles, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.