Abstract
Data-dependent permutations (DDP) are introduced as basic cryptographic primitives to construct fast hardware-oriented ciphers. Some variants of the DDP operations and their application in the cipher CIKS-1 are considered. A feature of CIKS-1 is the use of both the data-dependent transformation of round subkeys and the key-dependent DDP operations. © 2002 International Association for Cryptologic Research.
Author supplied keywords
Cite
CITATION STYLE
APA
Moldovyan, A. A., & Moldovyan, N. A. (2002). A cipher based on data-dependent permutations. Journal of Cryptology, 15(1), 61–72. https://doi.org/10.1007/s00145-001-0012-9
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.
Already have an account? Sign in
Sign up for free