Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Py (pronounced Roo, a shorthand for Kangaroo) is a new stream cipher designed especially for the Ecrypt stream cipher contest. It is based on a new kind of primitive, which we call Rolling Arrays. It also uses various other ideas from... more
Py (pronounced Roo, a shorthand for Kangaroo) is a new stream cipher designed especially for the Ecrypt stream cipher contest. It is based on a new kind of primitive, which we call Rolling Arrays. It also uses various other ideas from many types of ciphers, including variable rotations and permutations. In some sense, this design is a kind of a new type of rotor machine, which is specially designed with operations that are very efficient in software. The allowed stream size is 2(to the power 64) bytes in each stream (or 2 (to the power 40) in the smaller version Py6). The security claims of the cipher are that no key recovery attacks can be performed with complexity smaller than that of exhaustive search, and distinguishing attacks are also impractical with a similar complexity. The speed of the cipher is impressively fast, as it is more than 2.5 times faster than RC4 on a Pentium III (with less than 2.9 cycles/byte when implemented with the API of NESSIE and tested with the NESSIE software).
Construction of amicable orthogonal designs of quaternions Ying Zhao Jennifer Seberry Tianbing Xia School of Software Engineering and Computer Science University of Wollongong Wollongong, NSW, 2522 Australia Beata J. Wysocki Tadeusz A.... more
Construction of amicable orthogonal designs of quaternions Ying Zhao Jennifer Seberry Tianbing Xia School of Software Engineering and Computer Science University of Wollongong Wollongong, NSW, 2522 Australia Beata J. Wysocki Tadeusz A. Wysocki School of ...
We obtain explicit formulae for the values of the 2v — j minors, j = 0, 1, 2 of D-optimal designs of order 2v = x2 + y2, v odd, where the design is constructed using two circulant or type 1 incidence matrices of either two SBIBD(2s2 + 2s... more
We obtain explicit formulae for the values of the 2v — j minors, j = 0, 1, 2 of D-optimal designs of order 2v = x2 + y2, v odd, where the design is constructed using two circulant or type 1 incidence matrices of either two SBIBD(2s2 + 2s + 1, s2, s2-s/2) or 2 — {2s2 + 2s +
Research Interests:
Abstract. Nonlinearity, 0-1 balancedness and strict avalanche criterion (SAC) are important criteria for cryptographic functions. Bent functions have maximum nonlinearity and satisfy SAC however they are not 0-1 balanced and hence cannot... more
Abstract. Nonlinearity, 0-1 balancedness and strict avalanche criterion (SAC) are important criteria for cryptographic functions. Bent functions have maximum nonlinearity and satisfy SAC however they are not 0-1 balanced and hence cannot be directly used in many cryptosystems ...
Research Interests:
Research Interests:
)Jennifer Seberry, Xian-Mo Zhang and Yuliang ZhengDepartment of Computer ScienceUniversity of Wollongong, Wollongong, NSW 2522, Australiafjennie, xianmo, yuliangg@cs.uow.edu.auAbstract. Two significant recent advances in cryptanalysis,... more
)Jennifer Seberry, Xian-Mo Zhang and Yuliang ZhengDepartment of Computer ScienceUniversity of Wollongong, Wollongong, NSW 2522, Australiafjennie, xianmo, yuliangg@cs.uow.edu.auAbstract. Two significant recent advances in cryptanalysis, namely thedifferential attack put forward by Biham and Shamir [3] and the linearattack by Matsui [7, 8], have had devastating impact on data encryptionalgorithms. An eminent problem that researchers are facing is to designS-boxes or substitution
Research Interests:
We obtain explicit formulae for the values of the 2v — j minors, j = 0, 1, 2 of D-optimal designs of order 2v = x2 + y2, v odd, where the design is constructed using two circulant or type 1 incidence matrices of either two SBIBD(2s2 + 2s... more
We obtain explicit formulae for the values of the 2v — j minors, j = 0, 1, 2 of D-optimal designs of order 2v = x2 + y2, v odd, where the design is constructed using two circulant or type 1 incidence matrices of either two SBIBD(2s2 + 2s + 1, s2, s2-s/2) or 2 — {2s2 + 2s +
ABSTRACT
Three of the most important nonlinearity criteria for cryptographically strong functions are balancedness, nonlinearity and propagation criterion. In this paper we study systematic methods for constructing highly nonlinear balanced... more
Three of the most important nonlinearity criteria for cryptographically strong functions are balancedness, nonlinearity and propagation criterion. In this paper we study systematic methods for constructing highly nonlinear balanced Boolean functions satisfying the high degree ...
Research Interests:
ABSTRACT
Research Interests:
Research Interests:

And 128 more