Publication:
Efficient Methods To Generate Cryptographically Significant Binary Diffusion Layers

dc.authorscopusid15833929800
dc.authorscopusid12544814200
dc.authorscopusid8240135400
dc.authorscopusid57190744173
dc.contributor.authorAkleylek, S.
dc.contributor.authorRijmen, V.
dc.contributor.authorSakalli, M.T.
dc.contributor.authorÖztürk, E.
dc.date.accessioned2020-06-21T13:19:08Z
dc.date.available2020-06-21T13:19:08Z
dc.date.issued2017
dc.departmentOndokuz Mayıs Üniversitesien_US
dc.department-temp[Akleylek] Sedat, Department of Computer Engineering, Ondokuz Mayis Üniversitesi, Samsun, Turkey; [Rijmen] Vincent, KU Leuven, Leuven, Vlaams-Brabant, Belgium; [Sakalli] Muharrem Tolga, Department of Computer Engineering, Trakya Üniversitesi, Edirne, Edirne, Turkey; [Öztürk] Emir, Department of Computer Engineering, Trakya Üniversitesi, Edirne, Edirne, Turkeyen_US
dc.description.abstractIn this study, the authors propose new methods using a divide-and-conquer strategy to generate n × n binary matrices (for composite n) with a high/maximum branch number and the same Hamming weight in each row and column. They introduce new types of binary matrices: namely, (BHwC)t, m and (BCwC)q, m types, which are a combination of Hadamard and circulant matrices, and the recursive use of circulant matrices, respectively. With the help of these hybrid structures, the search space to generate a binary matrix with a high/maximum branch number is drastically reduced. By using the proposed methods, they focus on generating 12 × 12, 16 × 16 and 32 × 32 binary matrices with a maximum or maximum achievable branch number and the lowest implementation costs (to the best of their knowledge) to be used in block ciphers. Then, they discuss the implementation properties of binary matrices generated and present experimental results for binary matrices in these sizes. Finally, they apply the proposed methods to larger sizes, i.e. 48 × 48, 64 × 64 and 80 × 80 binary matrices having some applications in secure multi-party computation and fully homomorphic encryption. © The Institution of Engineering and Technology 2016.en_US
dc.identifier.doi10.1049/iet-ifs.2016.0085
dc.identifier.endpage187en_US
dc.identifier.issn1751-8709
dc.identifier.issn1751-8717
dc.identifier.issue4en_US
dc.identifier.scopus2-s2.0-85021374950
dc.identifier.scopusqualityQ3
dc.identifier.startpage177en_US
dc.identifier.urihttps://doi.org/10.1049/iet-ifs.2016.0085
dc.identifier.volume11en_US
dc.identifier.wosWOS:000404112600001
dc.identifier.wosqualityQ2
dc.language.isoenen_US
dc.publisherInstitution of Engineering and Technology journals@theiet.orgen_US
dc.relation.ispartofIET Information Securityen_US
dc.relation.journalIet Information Securityen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.titleEfficient Methods To Generate Cryptographically Significant Binary Diffusion Layersen_US
dc.typeArticleen_US
dspace.entity.typePublication

Files