On Compact Cauchy Matrices for Substitution-Permutation Networks
Citations
75 citations
57 citations
Additional excerpts
...(3) m = 8, A = [[3, 5], 8, 1, 3, 4, 2, 6, [2, 7]], B = A = [3, [6, 8], [1, 4], 5, 1, 7, 8, 2]....
[...]
...(2) Let A = [4, 5, 6, 8, 3, [4, 7], 1, 2], B = A−2 = [[1, 6], 4, 2, 7, 8, 5, [3, 7], 1]....
[...]
...(2) m = 8, A = [2, 3, 4, [1, 5], 8, 7, 5, [3, 6]], B = A = [4, 1, [2, 8], 3, [4, 7], 8, 6, 5], C = [[4, 7], 6, 5, 8, 7, 1, 2, 3]....
[...]
...(2) m = 8, A = [1, 2, [1, 3], [1, 2, 4], 6, 5, 8, 7], C = [5, 8, [2, 6], 7, 1, [3, 8], 4, 2], and B = (A + C)(16) = [[7, 8], 1, 7, [3, 8], [2, 4], [1, 4], 6, 5]....
[...]
...(2) m = 8, X = [2, 3, 4, [1, 3]], A = [ X, 0 0, X ] = [2, 3, 4, [1, 3], 6, 7, 8, [5, 7]], B =...
[...]
17 citations
17 citations
9 citations
References
10,083 citations
3,444 citations
"On Compact Cauchy Matrices for Subs..." refers background in this paper
...The new layer replaces the Shift-Rows and Mix-Columns operations by a 16 16 Cauchy matrix in every round, which improved the overall security of AES....
[...]
...An substitution-permutation network (SPN) is a cascade of diffusion and confusion layers, which are widely used in effective implementation and security evaluation of well-known block ciphers [7], [8], [13]....
[...]
...Circulant 4 4 GF ð28Þ AES [8] No Vandermonde 4 Nð4 N 10Þ GF ð28Þ Anubis [18] No Ad hoc 4 4 GF ð28Þ IDEA NXT [12] No Recursive 4 4 GF ð28Þ PHOTON [9] No Hadamard 4 4 GF ð28Þ Khazad [19] Yes CCM 4 4 GF ð28Þ This paper This paper Yes...
[...]
...In [10], by a random search of Cauchy-type MDS matrices, the authors proposed a new, large diffusion layer for the AES block cipher....
[...]
...The concept of MDS matrix comes from MDS codes in error-correcting codes [16], The application in secret-key algorithms has been suggested by Vaudenay in [17], and then adopted by many famous block ciphers, e.g., SHARK [13], Square [7], AES [8]....
[...]
759 citations
"On Compact Cauchy Matrices for Subs..." refers background in this paper
...An substitution-permutation network (SPN) is a cascade of diffusion and confusion layers, which are widely used in effective implementation and security evaluation of well-known block ciphers [7], [8], [13]....
[...]
426 citations
[...]
220 citations