On the distribution of characteristics in bijective mappings
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
On error preserving encryption algorithms for wireless video transmission
MULTIMEDIA '01 Proceedings of the ninth ACM international conference on Multimedia
Toward Provable Security of Substitution-Permutation Encryption Networks
SAC '98 Proceedings of the Selected Areas in Cryptography
Modeling Linear Characteristics of Substitution-Permutation Networks
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
On Some Cryptographic Properties of Rijndael
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
CRYPTO '85 Advances in Cryptology
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Nonlinear Parity Circuits and their Cryptographic Applications
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
On the Design of SP Networks From an Information Theoretic Point of View
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks
IEEE Transactions on Dependable and Secure Computing
The Dragon Stream Cipher: Design, Analysis, and Implementation Issues
New Stream Cipher Designs
A secure ubiquitous sensor network with Dragon
Proceedings of the 2009 International Conference on Hybrid Information Technology
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Enumerating nondegenerate permutations
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
A construction for one way hash functions and pseudorandom bit generators
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Kronecker products and shuffle algebra
IEEE Transactions on Computers
Cryptography in constant parallel time
Cryptography in constant parallel time
Dragon: a fast word based stream cipher
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Hi-index | 14.98 |
In attempting to solve the problems of data security, researchers, and practititioners are placing increasing emphasis on encryption. An important class of encryption schemes is that of substitution-permutation (SP) encryption networks. A variant of the SP network has been chosen by the National Bureau of Standards as the data encryption standard. In this paper, we introduce the concept of completeness, which captures the intuitive notion of complexity of SP networks. The completeness property is examined and a technique for designigning complete SP networks is demonstrated.