An Algorithm for Improving Algebraic Degree of S-Box Coordinate Boolean Functions Based on Affine Equivalence Transformation
A. Biryukov, C. De Canniere, A. Braeken and B. Preneel, A toolbox for cryptanalysis: Linear and affine equivalence algorithms, InInternational Conference on the Theory and Applications of Cryptographic Techniques, Springer, Berlin — Heidelberg, pp. 33-50 (May, 2003).
A. Bogdanov, L.R. Knudsen, G. Leander, C. Paar, A. Poschmann, M.J. Robshaw and C. Vikkelsoe, PRESENT: An ultra-lightweight block cipher, in International Workshop on Cryptographic Hardware and Embedded Systems (pp. 450-466), Springer, Berlin — Heidelberg (2007, September).
N.P. Borisenko and H.D. Tho, Algorithms for minimization of the number of logic elements in a circuit implementing S-box Boolean functions, in Proceedings of 3rd Workshop on Current Trends in Cryptology (CTCrypt’2014), Moscow, Russia (2014).
C. Boura and A. Canteaut, On the influence of the algebraic degree of on the algebraic degree of. IEEE Transactions on Information Theory 59(1) (2013), 691 – 702.
C. Boura, A. Canteaut and C. De Canniere, Higher-order differential properties of Keccak and Luffa, in International Workshop on Fast Software Encryption (pp. 252-269), Springer, Berlin — Heidelberg (February, 2011).
C. Carlet, Boolean functions for cryptography and error correcting codes, Boolean Models and Methods in Mathematics, Computer Science, and Engineering 2 (2010), 257.
Y. Crama and P.L. Hammer, Boolean Models and Methods in Mathematics, Computer Science, and Engineering (Vol. 2), Cambridge University Press (2010).
T.W. Cusick and P. Stanica„ Cryptographic Boolean Functions and Applications, Academic Press (2009).
J. Daemen and V. Rijmen, The Design of Rijndael: AES — the Advanced Encryption Standard, Springer Science & Business Media (2013).
L.T. Dung and H.D. Tho, An algorithm for improving algebraic degree of S-box based on affine equivalence transformation, International Journal of Knowledge and Systems Science 8(1) (2017), 53 – 64.
A. Grocholewska-Czuryło, Cryptographic properties of modified AES-like S-boxes, Annales UMCS, Informatica 11(2) (January, 2011), 37 – 48.
G. Ivanov, N. Nikolov and S. Nikova, Reversed genetic algorithms for generation of bijective S-boxes with good cryptographic properties, Cryptography and Communications 8(2) (2016), 247 – 276.
G. Leander and A. Poschmann, On the classification of 4 bit S-boxes, in: International Workshop on the Arithmetic of Finite Fields, pp. 159-176, Springer, Berlin — Heidelberg (June, 2007).
J. McLaughlin and J.A. Clark, Using evolutionary computation to create vectorial Boolean functions with low differential uniformity and high nonlinearity, arXiv preprint arXiv:1301.6972 (2013).
National Institute for Science and Technology (NIST), Advanced Encryption Standard (AES), URL: http://www.csrc.nist.gov/publications/fips/fips197/fips-197.pdf (November, 2001).
National Institute for Science andTechnology (NIST), Data Encryption Standard (DES), URL: http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf (October, 1999).
B. Preneel and A. Braeken, Cryptographic Properties of Boolean Functions and S-Boxes (2006).
A.G. Rostovtsev and E.B. Mahovenko, Theoretical cryptography, St. Petersburg Press (in Russian) (2005).
C.E. Shannon, Communication theory of secrecy systems, Bell System Technical Journal 28(4) (1949), 656 – 715.
Y. Tan, G. Gong and B. Zhu, Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions, Cryptography and Communications 8(2) (2016), 291 – 311.
eISSN 0975-5748; pISSN 0974-875X