An observation of cryptographic properties of 256 one-dimensional cellular automata rules
The robustness of a cryptographic system substantially depends on its underlying elements. Boolean functions are the most frequently used elements in various cryptographic systems, be it block ciphers, stream ciphers and hash functions. However, constructing Boolean functions satisfying all fundamen...
Saved in:
Main Authors: | Jamil, N., Mahmood, R., Zába, M.R., Zukamaen, Z.A., Udzir, N.I. |
---|---|
Format: | |
Published: |
2017
|
Online Access: | http://dspace.uniten.edu.my/jspui/handle/123456789/6652 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
STITCH-256: A dedicated cryptographic hash function
by: Jamil, N., et al.
Published: (2017) -
A collision resistant cryptographic hash function based on cellular automata rules
by: Jamil, Norziana
Published: (2013) -
Diffusion and statistical analysis of STITCH-256
by: Jamil, N., et al.
Published: (2017) -
Implementation of lightweight cryptographic primitives
by: Hammad, B.T., et al.
Published: (2017) -
Construction of Cryptographically Strong S-Boxes Inspired by Bee Waggle Dance
by: Isa, H., et al.
Published: (2017)