27
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Nonlinear 4 × 4 MDS diffusion layers

&
Pages 663-676 | Received 01 Jan 2021, Published online: 16 Dec 2021

References

  • D. Augot and M. Finiasz. Exhaustive Search for Small Dimension Recursive MDS Diffusion Layers for Block Ciphers and Hash Functions. ISIT, 1551-1555, 2013.
  • J. Daemen and V. Rijmen. The Design of Rijndael: AES. The Advanced Encryption Standard. Information Security and Cryptography. Springer, 2002.
  • S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad. Characterization of MDS mappings. IACR Cryptology ePrint Archive, Report 2015/002, 2015.
  • X. D. Dong, C. B. Son and E. Gunawan. Matrix characterization of MDS linear codes over modules. Linear Algebra and its Applications, 277(1-3), 1998. doi: 10.1016/S0024-3795(97)10073-8
  • ETSI/SAGE Specification. Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 and 128-EIA3. Document 2: ZUC Specification. Version: 1.6. June 28, 2011.
  • P. Gauravaram, L. R. Knudsen, K. Matusiewicz, F. Mendel, C. Rechberger, M. Schläffer and S. S. Thomsen. Grostl - a SHA-3 candidate. Symmetric Cryptography 2009.
  • Z. Guo, R. Liu, W. Wu and D. Lin. Direct construction of lightweight rotational-xor MDS diffusion layers. IACR Cryptology ePrint Archive, Report 2016/1036, 2016.
  • H. Han, X. Xu and S. Zhu. The Properties of Orthomorphisms on the Galois Field. Research Journal of Applied Sciences, Engineering and Technology, 5(5). 1853-1858, 2013, DOI: 10.19026/rjaset.5.4949
  • A. Klimov. Applications of T-functions in Cryptography. Thesis for the degree of Ph.D., Weizmann Institute of Science, 2005.
  • Y. Liu, V. Rijmen and G. Leander. Nonlinear diffusion layers. Designs, Codes and Cryptography, 86(11): 2469-2484 (2018). doi: 10.1007/s10623-018-0458-5
  • M. Liu and S. M. Sim. Lightweight MDS generalized circulant matrices. In Fast Software Encryption 23rd International Conference. FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers, pages 101-120, 2016.
  • Y. Li and M. Wang. On the Construction of Lightweight Circulant Involutory MDS Matrices. Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers.
  • S. Ling and Ch. Xing. Coding Theory: A First Course. Cambridge University Press, 2004.
  • M. R. Mirzaee Shamsabad and S. M. Dehnavi Provable one-XOR matrices for construction of hardware-oriented MDS Diffusion Layers. Journal of Discrete Mathematical Sciences and Cryptography 23:8, 1515-1528 (2020), DOI: 10.1080/09720529.2019.1643551.
  • M. R. Mirzaee Shamsabad and S. M. Dehnavi Randomized Nonlinear Software-oriented MDS Diffusion Layers. Groups Complexity Cryptology 11(2): 123-131 (2019) doi: 10.1515/gcc-2019-2011
  • M. Sajadieh, M. Dakhilalian, H. Mala and P. Sepehrdad. Efficient recursive diffusion layers for block ciphers and hash functions. J. Cryptology, 28(2):240-256, 2015. doi: 10.1007/s00145-013-9163-8
  • S. Sarkar and H. Syed. Lightweight Diffusion Layer: Importance of Toeplitz Matrices. IACR Trans. Symmetric Cryptol., 2016, 1, 95-113, 2016. doi: 10.46586/tosc.v2016.i1.95-113
  • J. Stern and S. Vaudenay. CS-Cipher. Fast Software Encryption, 5th International Workshop, FSE ‘98, 1998.
  • S. Vaudenay. On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER0. In B. Preenel, editor, Fast Software Encryption. Proceedings, LNCS 1008, (1995), 286-297.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.