A cipher based on data-dependent permutations

57Citations
Citations of this article
36Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Data-dependent permutations (DDP) are introduced as basic cryptographic primitives to construct fast hardware-oriented ciphers. Some variants of the DDP operations and their application in the cipher CIKS-1 are considered. A feature of CIKS-1 is the use of both the data-dependent transformation of round subkeys and the key-dependent DDP operations. © 2002 International Association for Cryptologic Research.

Cite

CITATION STYLE

APA

Moldovyan, A. A., & Moldovyan, N. A. (2002). A cipher based on data-dependent permutations. Journal of Cryptology, 15(1), 61–72. https://doi.org/10.1007/s00145-001-0012-9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free