Performance Analysis of the Modified Generated S-Box for Advanced Encryption Standards
Abstract
References
Index Terms
- Performance Analysis of the Modified Generated S-Box for Advanced Encryption Standards
Recommendations
Cryptographic strength evaluation of AES s-box variants
In recent years, researchers have constructed AES s-box variants by customising the values of the parameters in the equation of AES s-box. Strength of these s-box variants is evaluated against the cryptographic properties like avalanche effect, ...
Generation of AES-Like S-Boxes by Replacing Affine Matrix
FIT '14: Proceedings of the 2014 12th International Conference on Frontiers of Information TechnologyAES type S-boxes are constructed by replacing the affine matrix of AES S-box equation with 8x8 invertible affine matrices. The 8x8 S-boxes of AES produced in GF (28) are a nonlinear transformation that have significant effect on the strength of entire ...
Impossible differential cryptanalysis of 7-round advanced encryption standard (AES)
Devoted to the rapid publication of short contributions to information processingIn 2000, Biham and Keller [Cryptanalysis of reduced variants of Rijndael, 3rd AES Conference, in press] presented an impossible differential cryptanalysis of the Advanced Encryption Standard (AES) up to 5 rounds. This was later improved in 2001 by Cheon ...
Comments
Information & Contributors
Information
Published In
In-Cooperation
- The Hong Kong Polytechnic: The Hong Kong Polytechnic University
- Natl University of Singapore: National University of Singapore
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 74Total Downloads
- Downloads (Last 12 months)3
- Downloads (Last 6 weeks)0
Other Metrics
Citations
Cited By
View allView Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in