Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes Available at https, FSE. Lecture Notes in Computer Science ,
Exhaustive search for small dimension recursive MDS diffusion layers for block ciphers and hash functions, 2013 IEEE International Symposium on Information Theory, pp.1551-1555, 2013. ,
DOI : 10.1109/ISIT.2013.6620487
URL : https://hal.archives-ouvertes.fr/hal-00823082
Implementing Lightweight Block Ciphers on x86 Architectures, Selected Areas in Cryptography, pp.324-351, 2013. ,
DOI : 10.1007/978-3-662-43414-7_17
NEON Crypto, Lecture Notes in Computer Science, vol.7428, pp.320-339, 2012. ,
DOI : 10.1007/978-3-642-33027-8_19
A Serial-In???Serial-Out Hardware Architecture for Systematic Encoding of Hermitian Codes via Gr??bner Bases, IEEE Transactions on Communications, vol.52, issue.8, pp.1322-1332, 2004. ,
DOI : 10.1109/TCOMM.2004.833020
The Design of Rijndael: AES ? The Advanced Encryption Standard. Information Security and Cryptography, 2002. ,
DOI : 10.1007/978-3-662-04722-4
Weight distributions of geometric Goppa codes, Transactions of the American Mathematical Society, vol.351, issue.09, pp.3609-3639, 1999. ,
DOI : 10.1090/S0002-9947-99-02179-0
The PHOTON Family of Lightweight Hash Functions, Lecture Notes in Computer Science, vol.6841, pp.222-239, 2011. ,
DOI : 10.1007/978-3-642-22792-9_13
Accelerating AES with Vector Permute Instructions, Lecture Notes in Computer Science, vol.5747, pp.18-32, 2009. ,
DOI : 10.1007/978-3-642-04138-9_2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.520.9451
Systematic encoding via Grobner bases for a class of algebraic-geometric Goppa codes, IEEE Transactions on Information Theory, vol.41, issue.6, pp.1752-1761, 1995. ,
DOI : 10.1109/18.476247
Revised Selected Papers Selected Areas in Cryptography, Selected Areas in Cryptography, 19th International Conference, 2012. ,
On the Classification of 4 Bit S-Boxes, Lecture Notes in Computer Science, vol.4547, pp.159-176, 2007. ,
DOI : 10.1007/978-3-540-73074-3_13
The Theory of Error-Correcting Codes. North-Holland Mathematical Library, 1978. ,
The cipher SHARK, Lecture Notes in Computer Science, vol.1039, pp.99-111, 1996. ,
DOI : 10.1007/3-540-60865-6_47
Cryptographic Analysis of All 4 ?? 4-Bit S-Boxes, Lecture Notes in Computer Science, vol.8, issue.1, pp.118-133, 2011. ,
DOI : 10.1007/978-3-540-25937-4_18
Recursive Diffusion Layers for Block Ciphers and Hash Functions, Lecture Notes in Computer Science, vol.7549, pp.385-401, 2012. ,
DOI : 10.1007/978-3-642-34047-5_22
Algebraic Function Fields and Codes. 2 edn, Graduate Texts in Mathematics, vol.254, 2009. ,
TWINE: A Lightweight Block Cipher for Multiple Platforms, pp.339-354 ,
Efficient Cache Attacks on AES, and Countermeasures, Journal of Cryptology, vol.10, issue.4, pp.37-71, 2010. ,
DOI : 10.1007/s00145-009-9049-y
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.1984
Introduction to Coding Theory, Graduate Texts in Mathematics, vol.86, 1999. ,
Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions, pp.355-371 ,
DOI : 10.1007/978-3-642-35999-6_23