Academic literature on the topic 'Substitution Permutation networks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Substitution Permutation networks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Substitution Permutation networks"
Heys, H. M., and S. E. Tavares. "Cryptanalysis of tree-structured substitution-permutation networks." Electronics Letters 29, no. 1 (1993): 40–41. http://dx.doi.org/10.1049/el:19930026.
Full textHeys, H. M., and S. E. Tavares. "Avalanche characteristics of substitution-permutation encryption networks." IEEE Transactions on Computers 44, no. 9 (1995): 1131–39. http://dx.doi.org/10.1109/12.464391.
Full textMiles, Eric, and Emanuele Viola. "Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs." Journal of the ACM 62, no. 6 (2015): 1–29. http://dx.doi.org/10.1145/2792978.
Full textCui, Ting, Chenhui Jin, and Zhiyin Kong. "On Compact Cauchy Matrices for Substitution-Permutation Networks." IEEE Transactions on Computers 64, no. 7 (2015): 2098–102. http://dx.doi.org/10.1109/tc.2014.2346180.
Full textHeys, Howard M., and Stafford E. Tavares. "CRYPTANALYSIS OF SUBSTITUTION-PERMUTATION NETWORKS USING KEY-DEPENDENT DEGENERACY." Cryptologia 20, no. 3 (1996): 258–74. http://dx.doi.org/10.1080/0161-119691884951.
Full textPing, Ping, Feng Xu, Yingchi Mao, and Zhijian Wang. "Designing permutation–substitution image encryption networks with Henon map." Neurocomputing 283 (March 2018): 53–63. http://dx.doi.org/10.1016/j.neucom.2017.12.048.
Full textO'Connor, L. "A differential cryptanalysis of tree-structured substitution-permutation networks." IEEE Transactions on Computers 44, no. 9 (1995): 1150–52. http://dx.doi.org/10.1109/12.464394.
Full textHeys, Howard M., and Stafford E. Tavares. "Substitution-permutation networks resistant to differential and linear cryptanalysis." Journal of Cryptology 9, no. 1 (1996): 1–19. http://dx.doi.org/10.1007/bf02254789.
Full textGerber, B. S., T. G. Tape, R. S. Wigton, and P. S. Heckerling. "Entering the Black Box of Neural Networks." Methods of Information in Medicine 42, no. 03 (2003): 287–96. http://dx.doi.org/10.1055/s-0038-1634363.
Full textWang, Huili, Wenping Ma, Lang Liao, Yushan Li, and Linfeng Zheng. "Impossible Differential Distinguishers of Two Generalized Feistel Structures." Security and Communication Networks 2020 (September 22, 2020): 1–9. http://dx.doi.org/10.1155/2020/8828504.
Full textDissertations / Theses on the topic "Substitution Permutation networks"
Chen, Zhi-Guo. "Security aspects of substitution-permutation encryption networks." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape17/PQDD_0008/MQ36013.pdf.
Full textRoué, Joëlle. "Analyse de la résistance des chiffrements par blocs aux attaques linéaires et différentielles." Thesis, Paris 6, 2015. http://www.theses.fr/2015PA066512/document.
Full textRoué, Joëlle. "Analyse de la résistance des chiffrements par blocs aux attaques linéaires et différentielles." Electronic Thesis or Diss., Paris 6, 2015. http://www.theses.fr/2015PA066512.
Full textChen, Cheng S. M. Massachusetts Institute of Technology. "Security of substitution-permutation network." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/101582.
Full textKeliher, Liam. "Substitution-permutation network cryptosystems using key-dependent s-boxes." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp04/mq22329.pdf.
Full textLiu, Wei-Ting, and 劉韋廷. "Linear Attacks on Substitution-Permutation Networks." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/31344316948718238228.
Full textBaril-Robichaud, Patrick. "SAND, un protocole de chiffrement symétrique incompressible à structure simple." Thèse, 2014. http://hdl.handle.net/1866/12265.
Full textXu, Jianhong. "Design and implementation of an advanced substitution-permutation encryption network /." 1997.
Find full textBook chapters on the topic "Substitution Permutation networks"
Easttom, William. "Substitution–Permutation Networks." In Modern Cryptography. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-63115-4_7.
Full textEasttom, Chuck. "Substitution-Permutation Networks." In Modern Cryptography. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-12304-7_7.
Full textKeliher, Liam, Henk Meijer, and Stafford Tavares. "Modeling Linear Characteristics of Substitution-Permutation Networks." In Selected Areas in Cryptography. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-46513-8_6.
Full textSadowski, Albert. "Inefficiency of variant characteristics for substitution-permutation networks with position permutations." In Information Security and Privacy. Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0027924.
Full textMiles, Eric, and Emanuele Viola. "Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32009-5_5.
Full textChen, Zhi Guo, and Stafford E. Tavares. "Towards Provable Security of Substitution-Permutation Encryption Networks." In Selected Areas in Cryptography. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48892-8_4.
Full textLiu, Tianren, Stefano Tessaro, and Vinod Vaikuntanathan. "The t-wise Independence of Substitution-Permutation Networks." In Advances in Cryptology – CRYPTO 2021. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-84259-8_16.
Full textTeşeleanu, George. "The Security of Quasigroups Based Substitution Permutation Networks." In Innovative Security Solutions for Information Technology and Communications. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-32636-3_18.
Full textBhamidipati, Kishore, and Soorya Annadurai. "Permutation–Substitution Based Image Encryption Algorithms Using Pseudorandom Number Generators." In Handbook of Computer Networks and Cyber Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-22277-2_33.
Full textGrassi, Lorenzo, Reinhard Lüftenegger, Christian Rechberger, Dragos Rotaru, and Markus Schofnegger. "On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy." In Advances in Cryptology – EUROCRYPT 2020. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45724-2_23.
Full textConference papers on the topic "Substitution Permutation networks"
Lewandowski, Matthew, and Srinivas Katkoori. "Enhancing PRESENT-80 and Substitution-Permutation Network Cipher Security with Dynamic "Keyed" Permutation Networks." In 2021 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE, 2021. http://dx.doi.org/10.1109/isvlsi51109.2021.00070.
Full textJohnson, John L. "Symbolic substitution and patterns." In OSA Annual Meeting. Optica Publishing Group, 1987. http://dx.doi.org/10.1364/oam.1987.tuw5.
Full textHeys, H. M., and S. E. Tavares. "The design of substitution-permutation networks resistant to differential and linear cryptanalysis." In the 2nd ACM Conference. ACM Press, 1994. http://dx.doi.org/10.1145/191177.191206.
Full textKatiyar, Supreeti, Sharma Priya, Mayank Agarwal, and Sukumar Nandi. "Differential cryptanalysis of Substitution Permutation network." In 2016 International Conference on Accessibility to Digital World (ICADW). IEEE, 2016. http://dx.doi.org/10.1109/icadw.2016.7942520.
Full textBrown, Joseph Alexander, Sheridan Houghten, and Beatrice Ombuki-Berman. "Genetic algorithm cryptanalysis of a substitution permutation network." In 2009 IEEE Symposium on Computational Intelligence in Cyber Security (CICS). IEEE, 2009. http://dx.doi.org/10.1109/cicybs.2009.4925098.
Full textLevina, Alla, Ivan Kamnev, and Igor Zikratov. "Implementation White Box Cryptography in Substitution-Permutation network." In 2020 9th Mediterranean Conference on Embedded Computing (MECO). IEEE, 2020. http://dx.doi.org/10.1109/meco49872.2020.9134124.
Full textMishra, Ruby, Sayantani Dutta, Manish Okade, and Kamalakanta Mahapatra. "Substitution Permutation Network based Lightweight Ciphers with Improved Substitution Layers for Secure IoT Applications." In 2021 2nd International Conference on Range Technology (ICORT). IEEE, 2021. http://dx.doi.org/10.1109/icort52730.2021.9581374.
Full textRuzhentsev, Victor, Roman Levchenko, and Oleksandr Fediushyn. "Cryptanalysis of Simple Substitution-Permutation Cipher Using Artificial Neural Network." In 2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T). IEEE, 2020. http://dx.doi.org/10.1109/picst51311.2020.9467945.
Full textGirija, R., and Hukum Singh. "A new substitution-permutation network cipher using Walsh Hadamard Transform." In 2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN). IEEE, 2017. http://dx.doi.org/10.1109/ic3tsn.2017.8284470.
Full textMarconot, Johan, David Hely, and Florian Pebay-Peyroula. "SPN-DPUF: Substitution-Permutation Network Based Secure Circuit for Digital PUF." In 2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE, 2019. http://dx.doi.org/10.1109/isvlsi.2019.00018.
Full text