2005
DOI: 10.1007/11495772_38
|View full text |Cite
|
Sign up to set email alerts
|

On Application of Neural Networks for S-Boxes Design

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2007
2007
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…Lately, in [91,115,116] some techniques for the improvement of the previously proposed protocol were presented. Finally, the idea of applying ANNs for the construction of S-boxes was presented in [60].…”
Section: Review Of Cryptography and Cryptanalysis Through Computationmentioning
confidence: 99%
“…Lately, in [91,115,116] some techniques for the improvement of the previously proposed protocol were presented. Finally, the idea of applying ANNs for the construction of S-boxes was presented in [60].…”
Section: Review Of Cryptography and Cryptanalysis Through Computationmentioning
confidence: 99%
“…The higher dimension multilayer perceptron has very complex nonlinear dynamic behaviors, which contain various functions (e.g., activation function and step function). As Piotr et al remarked [ 14 ], securely enhance multilayer perceptron must satisfy certain conditions, the higher the dimension of S-box, the more statistical analysis it can be applied to multilayer perceptron, which is complex for algorithm designers and malicious password analysts. Yet, the carefully designed S-box is just a strong nonlinear Boolean (vector) map with avalanche characteristics.…”
Section: Introductionmentioning
confidence: 99%
“…The term itself was first time used by Dourlens [13] in 1995. The neural networks are exploited to the realization of the cryptographic operations such as the S-BOX operation [14]. In addition they can be used in cryptographic context as a supporting tool e.g.…”
Section: Introductionmentioning
confidence: 99%