Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,098,317 papers from all fields of science
Search
Sign In
Create Free Account
S-box
Known as:
S box
, S-boxes
, SBox
Expand
In cryptography, an S-box (substitution-box) is a basic component of symmetric key algorithms which performs substitution. In block ciphers, they are…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
36 relations
Backdoor (computing)
Bent function
Block cipher
CAST-256
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Random Search Based Efficient Chaotic Substitution Box Design for Image Encryption
Musheer Ahmad
,
Zishan Ahmad
Int. J. Rough Sets Data Anal.
2018
Corpus ID: 19124791
CryptographicSubstitution-boxesaresourceofnonlinearityinmodernblockencryptionsystems. Therobustnessandconfusion…
Expand
2013
2013
Specialized genetic algorithm to solve the electrical distribution system expansion planning
Vera Camargo
,
M. Lavorato
,
R. Romero
IEEE Power & Energy Society General Meeting
2013
Corpus ID: 44226066
A specialized genetic algorithm with a adaptation of Chu-Beasley algorithm is presented in this paper to solve the electrical…
Expand
2009
2009
Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages
J. Faugère
,
Ludovic Perret
Conference on Information Security and Cryptology
2009
Corpus ID: 2246420
In this paper, we present an algebraic attack against the Flurry and Curry block ciphers [12,13]. Usually, algebraic attacks…
Expand
2007
2007
Introduction: Future Challenges of European Citizenship—Facing a Wide-Open Pandora's Box
S. Besson
,
André Utzinger
2007
Corpus ID: 54987460
2001
2001
Linear and Differential Cryptanalysis of Russian GOST
V. V. Shorin
,
Vadim V. Jelezniakov
,
E. Gabidulin
Electron. Notes Discret. Math.
2001
Corpus ID: 5467643
Highly Cited
2000
Highly Cited
2000
On the Pseudorandomness of Top-Level Schemes of Block Ciphers
S. Moriai
,
S. Vaudenay
International Conference on the Theory and…
2000
Corpus ID: 6773521
Block ciphers are usually basedon one top-level scheme into which we plug "roundf unctions". To analyze security, it is important…
Expand
2000
2000
Relationships among Differential, Truncated Differential, Impossible Differential Cryptanalyses against Word-Oriented Block Ciphers like RIJNDAEL, E2
M. Sugita
,
K. Kobara
,
K. Uehara
,
S. Kubota
,
H. Imai
AES Candidate Conference
2000
Corpus ID: 7915668
We propose a new method for evaluating the security of block ciphers against di erential cryptanalysis and propose new structures…
Expand
1998
1998
On the Propagation Criterion of Degree l and Order k
C. Carlet
International Conference on the Theory and…
1998
Corpus ID: 10337013
We determine those Boolean functions on GF(2)n which satisfy the propagation criterion of degree l and order k ≥ n − l }- 2. All…
Expand
1998
1998
Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs
Adam L. Young
,
M. Yung
Fast Software Encryption Workshop
1998
Corpus ID: 12600434
We consider the problem of designing a black-box symmetric cipher that leaks information subliminally and exclusively to the…
Expand
1976
1976
Transient Thermal Analysis of Solid-State Power Devices--Making a Dreaded Process Easy
W. Newell
IEEE transactions on industry applications
1976
Corpus ID: 18977996
In spite of its importance in the rating and reliable application of power diodes and thyristors, the computation of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE