Substitution-permutation network

Known as: SP-network, SPN 
In cryptography, an SP-network, or substitution-permutation network (SPN), is a series of linked mathematical operations used in block cipher… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Many modern block ciphers are constructed based on the paradigm of substitution-permutation networks (SPNs). But, somewhat… (More)
  • figure 1
Is this relevant?
2015
2015
Maximum distance separable (MDS) matrices are widely used in the design of block ciphers. However, it is highly nontrival to find… (More)
  • table 1
  • table 2
  • table 3
Is this relevant?
2012
2012
This article takes a new step towards closing the gap between pseudorandom functions (PRF) and their popular, bounded-input… (More)
  • figure 1
Is this relevant?
2009
2009
We provide a preliminary exploration of the use of Genetic Algorithms (GA) upon a Substitution Permutation Network (SPN) cipher… (More)
  • figure 1
  • figure 2
  • table I
  • table II
  • figure 3
Is this relevant?
2005
2005
In this paper we study the substitution-permutation network (SPN) on which AES is based. We introduce AES, a SPN identical to AES… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Deliberate injection of faults into cryptographic devices is an effective cryptanalysis technique against symmetric and… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Is this relevant?
2003
2003
In this paper, a method to discover the key of a substitution permutation network (SPN) using genetic algorithms is described. A… (More)
  • figure 2
Is this relevant?
1999
1999
In this paper we present a model for the bias values associated with linear characteristics of substitution-permutation networks… (More)
Is this relevant?
1997
1997
Substitution-permutation networks (SPNs) are an important class of private key cryptosystems, having substitution boxes (s-boxes… (More)
Is this relevant?
1994
1994
In this paper we examinethe key clustering characteristics of a classof block cryptosystemsreferred to as substitution… (More)
  • figure 1
  • table 1
Is this relevant?