Cryptographic applications of T-functions

被引:0
|
作者
Klimov, A [1 ]
Shamir, A [1 ]
机构
[1] Weizmann Inst Sci, Dept Comp Sci, IL-76100 Rehovot, Israel
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A T-function is a mapping in which the i-th bit of the output can depend only on bits 0, 1,..., i of the input. All the bitwise machine operations and most of the numeric machine operations in modern processors are T-functions, and their compositions are also T-functions. In this paper we show that T-functions can be used to construct exceptionally efficient cryptographic building blocks which can be used as nonlinear maximal length state transition functions in stream ciphers, as large S-boxes in block ciphers, and as non-algebraic multipermutations in hash functions.
引用
收藏
页码:248 / 261
页数:14
相关论文
共 50 条
  • [41] INVIVO AND INVITRO EFFECTS OF THE THYMIC SERUM FACTOR (FTS) ON MARKERS AND T-FUNCTIONS IN ALLOGENIC MEDULLARY TRANSPLANTATIONS
    BORDIGONI, P
    BENE, MC
    DONNER, M
    JANOT, C
    FAURE, G
    DARDENNE, M
    DUHEILLE, J
    OLIVE, D
    NOUVELLE REVUE FRANCAISE D HEMATOLOGIE, 1983, 25 (03): : 206 - 206
  • [42] Optimizing the H01-to-H02 mode transformer profile using the T-functions apparatus
    Kurayev, AA
    Popkova, TL
    Yaromenok, SI
    Karakulko, AS
    14TH INTERNATIONAL CRIMEAN CONFERENCE: MICROWAVE & TELECOMMUNICATION TECHNOLOGY, CONFERENCE PROCEEDINGS, 2004, : 193 - 194
  • [43] CRYPTOGRAPHIC HASH FUNCTIONS
    PRENEEL, B
    EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 1994, 5 (04): : 431 - 448
  • [44] Cryptographic hash functions
    Preneel, Bart
    European transactions on telecommunications and related technologies, 1994, 5 (04): : 431 - 448
  • [45] Novel Non-cryptographic Hash Functions for Networking and Security Applications on FPGA
    Claesen, Thomas
    Sateesan, Arish
    Vliegen, Jo
    Mentens, Nele
    2021 24TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD 2021), 2021, : 347 - 354
  • [46] Cryptographic applications in FPGA
    Deschamps, J. -P.
    LATIN AMERICAN APPLIED RESEARCH, 2007, 37 (01) : 3 - 10
  • [47] The state of cryptographic hash functions
    Preneel, B
    LECTURES ON DATA SECURITY: MODERN CRYPTOLOGY IN THEORY AND PRACTICE, 1999, 1561 : 158 - 182
  • [48] On cryptographic complexity of Boolean functions
    Carlet, C
    FINITE FIELDS WITH APPLICATIONS TO CODING THEORY, CRYPTOGRAPHY AND RELATED AREAS, 2002, : 53 - 69
  • [49] Cryptographic redundancy and mixing functions
    Collins, O
    IEEE TRANSACTIONS ON COMMUNICATIONS, 1996, 44 (04) : 423 - 426
  • [50] NONLINEARITY CRITERIA FOR CRYPTOGRAPHIC FUNCTIONS
    MEIER, W
    STAFFELBACH, O
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 549 - 562