S-box

Known as: S box, S-boxes, Sbox 
In cryptography, an S-box (substitution-box) is a basic component of symmetric key algorithms which performs substitution. In block ciphers, they are… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1948-2017
05010015019482016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2008
2008
We present Gray S-box for advanced encryption standard. Gray S-box is constructed by adding binary Gray code transformation as a… (More)
  • table 1
  • table 2
  • table 5
  • table 3
  • table 6
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Implementations of the Advanced Encryption Standard (AES), including hardware applications with limited resources (e.g., smart… (More)
Is this relevant?
2006
2006
In this paper, we present the parity prediction approach of the S-Box for designing high performance and fault detection… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
A key step in the Advanced Encryption Standard (AES) algorithm is the “S-box.” Many implementations of AES have been proposed… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
Highly Cited
2005
Highly Cited
2005
So far, efficient algorithmic countermeasures to secure the AES algorithm against (first-order) differential side-channel attacks… (More)
  • table 1
Is this relevant?
Highly Cited
2005
Highly Cited
2005
For the power consumption model called Hamming weight model, we rewrite DPA attacks in terms of correlation coefficients between… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Compact and high-speed hardware architectures and logic optimization methods for the AES algorithm Rijndael are described… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2000
Highly Cited
2000
We discuss an efficient hardware implementation of the Rijndael S-box. 
  • figure 1
Is this relevant?
1997
1997
In [12], T. Matsumoto and H. Imai designed an asymmetric cryptosystem, called C∗, for authentication, encryption and signature… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
1996
1996
Nortel, P.O. Box 3511, Station C, Ottawa, Ontario, Canada, K1Y 4H7 cf744@freenet.carleton.ca, cadams@nortel.ca 
Is this relevant?