A key step in the Advanced Encryption Standard (AES) algorithm is the “S-box.” Many implementations of AES have been proposed, for various goals, that effect the S-box in various ways. In particular,… (More)

This paper presents new software speed records for AES-128 encryption for architectures at both ends of the performance spectrum. On the one side we target the low-end 8-bit AVR microcontrollers and… (More)

In this paper, we investigate some algebraic and combinatorial properties of a special Boolean function on n variables, defined using weighted sums in the residue ring modulo the least prime p ≥ n.… (More)

From any given Iterated Function System, a small set of balls that cover the fractal attractor can be simply determined. This gives a priori bounds on the region of space in which the attractor may… (More)

We explore ways to reduce the number of bit operations required to implement AES. One way involves optimizing the composite field approach for entire rounds of AES. Another way is integrating the… (More)

The Naval Space Command maintains a database of orbital elements for the objects in the space catalog. This report is a documentation of the software which inputs new observations of a satellite and… (More)

The goal of this paper is two-fold. We first focus on the problem of deciding whether two monomial rotation symmetric (MRS) Boolean functions are affine equivalent via a permutation. Using a… (More)