Cryptanalysis of DES with a reduced number of rounds
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Nonlinearity criteria for cryptographic functions
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Constructions of bent functions and difference sets
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Propagation characteristics of Boolean functions
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Differential Cryptanalysis of DES-like Cryptosystems
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Provable Security Against Differential Cryptanalysis
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract)
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Differtial Cryptanalysis of Lucifer
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Pitfalls in Designing Substitution Boxes (Extended Abstract)
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Cryptographic Functions and Design Criteria for Block Ciphers
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Construction of Cryptographically Important Boolean Functions
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Optimal Resistance Against the Davies and Murphy Attack
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Improved Construction of Nonlinear Resilient S-Boxes
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
FSE '98 Proceedings of the 5th International Workshop on Fast Software Encryption
A new characterization of group action-based perfect nonlinearity
Discrete Applied Mathematics
Designs, Codes and Cryptography
CCZ-equivalence of bent vectorial functions and related constructions
Designs, Codes and Cryptography
On the security of 4-bit involutive S-boxes for lightweight designs
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
Fast correlation attacks: methods and countermeasures
FSE'11 Proceedings of the 18th international conference on Fast software encryption
Divisible designs and semi-regular relative difference sets from additive Hadamard cocycles
Journal of Combinatorial Theory Series A
On known and new differentially uniform functions
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
On cross-correlation indicators of an S-box
Frontiers of Computer Science in China
A complete formulation of generalized affine equivalence
ICTCS'05 Proceedings of the 9th Italian conference on Theoretical Computer Science
A theory of highly nonlinear functions
AAECC'06 Proceedings of the 16th international conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
A new criterion for nonlinearity of block ciphers
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
Intersection of Hamming codes avoiding Hamming subcodes
Designs, Codes and Cryptography
Cryptography and Communications
A new construction of highly nonlinear S-boxes
Cryptography and Communications
Efficient representation and software implementation of resilient maiorana-mcfarland s-boxes
WISA'04 Proceedings of the 5th international conference on Information Security Applications
A survey of some recent results on bent functions
SETA'04 Proceedings of the Third international conference on Sequences and Their Applications
Generalized boolean bent functions
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
An evolutionary algorithm to improve the nonlinearity of self-inverse s-boxes
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
A note of perfect nonlinear functions
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Proving the security of AES substitution-permutation network
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
On certain diagonal equations over finite fields
Finite Fields and Their Applications
Finite Fields and Their Applications
PICARO: a block cipher allowing efficient higher-order side-channel resistance
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
On multiple output bent functions
Information Processing Letters
"Provable" security against differential and linear cryptanalysis
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
A note on vectorial bent functions
Information Processing Letters
On using genetic algorithms for intrinsic side-channel resistance: the case of AES S-box
Proceedings of the First Workshop on Cryptography and Security in Computing Systems
On the relationships between perfect nonlinear functions and universal hash families
Theoretical Computer Science
Permutations of finite fields with prescribed properties
Journal of Computational and Applied Mathematics
On generalized bent functions with Dillon's exponents
Information Processing Letters
Asymptotic nonlinearity of vectorial Boolean functions
Cryptography and Communications
Hi-index | 0.00 |
A perfect nonlinear S-box is a substitution transformation with evenly distributed directional derivatives. Since the method of differential cryptanalysis presented by E. Biham and A. Shamir makes use of nonbalanced directional derivatives, the perfect nonlinear S-boxes are immune to this attack. The main result is that for a perfect nonlinear S-box the number of input variables is at least twice the number of output variables. Also two different construction methods are given. The first one is based on the Maiorana-McFarland construction of bent functions and is easy and efficient to implement. The second method generalizes Dillon's construction of difference sets.