A Note on 5-bit Quadratic Permutations’ Classification

Article English OPEN
Dušan Božilov; Begül Bilgin; Hacı Ali Sahin;
(2017)

Classification of vectorial Boolean functions up to affine equivalence is used widely to analyze various cryptographic and implementation properties of symmetric-key algorithms. We show that there exist 75 affine equivalence classes of 5-bit quadratic permutations. Furt... View more
  • References (21)
    21 references, page 1 of 3

    [1] Elena Andreeva, Begül Bilgin, Andrey Bogdanov, Atul Luykx, Florian Mendel, Bart Mennink, Nicky Mouha, Qingju Wang, and Kan Yasuda. CAESAR submission: PRIMATEs v1.02, March 2014. http://primates.ae/wp-content/uploads/primatesv1.02.pdf.

    [2] Elwyn Berlekamp and Lloyd Welch. Weight distributions of the cosets of the (32,6) Reed-Muller code. IEEE Transactions on Information Theory, 18(1):203-207, Jan 1972.

    [3] Guido Bertoni, Joan Daemen, Michaël Peeters, and Gilles Van Assche. The Keccak reference, January 2011. http://keccak.noekeon.org/.

    [4] Guido Bertoni, Joan Daemon, Michaël Peeters, Gilles Van Assche, and Ronny Van Keer. CAESAR submission: Ketje v1, March 2014. https://competitions.cr.yp.to/round1/ ketjev1.pdf.

    [5] Guido Bertoni, Joan Daemon, Michaël Peeters, Gilles Van Assche, and Ronny Van Keer. CAESAR submission: Keyak v2, August 2015. https://competitions.cr.yp.to/round2/ keyakv2.pdf.

    [6] Eli Biham and Adi Shamir. Differential cryptanalysis of DES-like cryptosystems. In International Cryptology Conference on Advances in Cryptology, CRYPTO 1990, pages 2-21, London, UK, UK, 1991. Springer-Verlag.

    [7] Begül Bilgin. Threshold Implementations : As Countermeasure Against Higher-Order Differential Power Analysis. PhD thesis, May 2015.

    [8] Begül Bilgin, Andrey Bogdanov, Miroslav Knezevic, Florian Mendel, and Qingju Wang. Fides: Lightweight authenticated cipher with side-channel resistance for constrained hardware. In Cryptographic Hardware and Embedded Systems, CHES 2013, volume 8086 of LNCS, pages 142-158, Heidelberg, Germany, 2013. Springer.

    [9] Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen, Natalia Tokareva, and Valeriya Vitkup. Threshold implementations of small s-boxes. Cryptography and Communications, 7(1):3-33, 2015.

    [10] Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, and Tobias Schneider. Strong 8-bit sboxes with efficient masking in hardware. In Cryptographic Hardware and Embedded Systems - CHES 2016, pages 171-193, Berlin, Heidelberg, 2016. Springer Berlin Heidelberg.

  • Similar Research Results (1)
  • Metrics
Share - Bookmark