2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT) 2012
DOI: 10.1109/acsat.2012.23
|View full text |Cite
|
Sign up to set email alerts
|

Security of Present S-box

Abstract: Resource efficient cryptographic p fundamental for realizing both security a embedded systems like RFID (Radio-Frequen tags and sensor nodes. Among those primi block cipher plays a major role to secure RF the common lightweight block ciphers is PR paper, we attended both conditions of PRES box S-box and those conditions of 4-bit studied and analyzed thoroughly in relatio differential cryptanalysis. The results sho conflict in one of the conditions of PRESENT Keywords: S-box, PRESENT lightweight b cryptanalysis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 10 publications
(17 reference statements)
0
2
0
Order By: Relevance
“…The second step is computation over an Af. The important effect of applying an invertible Af before and after the Sub‐Bytes is that the resistance of S‐boxes against most attacks remains unchanged [18]. Equation (5) is the Af, which g)(x=false(a7a6a5a4a3a2a1a0false) is the multiplicative inverse of f ( x ), and Y is the Sub‐Bytes of the f ( x ) right leftthickmathspace.5emY=Af(g(x))+Φ=1em4pt1001em4pt1101em4pt1111em4pt1100011100111100001111110001111<...>…”
Section: Aes Functions Implementationmentioning
confidence: 99%
“…The second step is computation over an Af. The important effect of applying an invertible Af before and after the Sub‐Bytes is that the resistance of S‐boxes against most attacks remains unchanged [18]. Equation (5) is the Af, which g)(x=false(a7a6a5a4a3a2a1a0false) is the multiplicative inverse of f ( x ), and Y is the Sub‐Bytes of the f ( x ) right leftthickmathspace.5emY=Af(g(x))+Φ=1em4pt1001em4pt1101em4pt1111em4pt1100011100111100001111110001111<...>…”
Section: Aes Functions Implementationmentioning
confidence: 99%
“…Incorporation of remote sensor networks, in healthcare systems, is a developing field for logical examination. Present day healthcare systems require realtime monitoring of patients in terms of vital status with less communication between specialists and the patients [10]. Powerful as well as strong cryptographic techniques are crucial to develop a safety-driven application.…”
Section: Introductionmentioning
confidence: 99%