On constructions and nonlinearity of correlation immune functions
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
On Correlation-Immune Functions
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
On the Correlation Immune Functions and Their Nonlinearity
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Improved Construction of Nonlinear Resilient S-Boxes
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Construction of nonlinear boolean functions with important cryptographic properties
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Algebraic attacks on stream ciphers with linear feedback
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Cryptographically resilient functions
IEEE Transactions on Information Theory
Almost perfect nonlinear power functions on GF(2n): the Welch case
IEEE Transactions on Information Theory
Linear codes in generalized construction of resilient functions with very high nonlinearity
IEEE Transactions on Information Theory
On guess and determine cryptanalysis of LFSR-based stream ciphers
IEEE Transactions on Information Theory
Hi-index | 0.06 |
We consider software implementation of resilient Maiorana-McFarland S-boxes. Such S-boxes have application in the design of stream ciphers and their efficient software implementation is important for software implementation of the corresponding stream ciphers. Most papers on construction of resilient Maiorana-McFarland S-boxes provide mathematical descriptions which are not sufficient for implementation purposes. Moreover, the mathematical descriptions do not bring out the fact that in most cases such S-boxes can be efficiently implemented using a small amount of memory. Our work shows that these S-boxes can be implemented using a small amount of memory and the output of an S-box can be computed using a small number of operations.