-
1
Galois Field Instructions in the Sandblaster 2.0 Architectrue
Published 2009-01-01“…This paper presents a novel approach to implementing multiplication of Galois Fields with 2N. Elements of GF(2N) can be represented as polynomials of degree less than N over GF(2). …”
Get full text
Article -
2
Enhancing the robustness of block ciphers through a graphical S-box evolution scheme for secure multimedia applications
Published 2024-12-01Subjects: Get full text
Article -
3
Error Correction for Check Digit Systems over p-Groups and Applications to DNA Sequences
Published 2025-01-01Subjects: Get full text
Article -
4
Lightweight AES Design for IoT Applications: Optimizations in FPGA and ASIC With DFA Countermeasure Strategies
Published 2025-01-01Subjects: Get full text
Article -
5
A Novel Scheme for Construction of S-Box Using Action of Power Associative Loop and Its Applications in Text Encryption
Published 2024-01-01“…The conventional construction of substitution boxes (S-boxes) has long relied on associative algebras such as Galois fields and cyclic groups. However, recent developments have motivated researchers to investigate non-associative algebras. …”
Get full text
Article -
6
Cryptanalysis of hyperchaotic S-box generation and image encryption
Published 2024-12-01“…The proposed S-boxes improve the security features by employing chaotic maps and Galois fields, which go beyond traditional design approaches. …”
Get full text
Article -
7
Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application
Published 2023-01-01“…The proposed mathematical structure is superior to Galois Field (GF) in terms of complexity and has the ability to create arbitrary randomness due to a larger key space. …”
Get full text
Article -
8
The Projective Character Tables of a Solvable Group 26:6×2
Published 2019-01-01“…The Chevalley–Dickson simple group G24 of Lie type G2 over the Galois field GF4 and of order 251596800=212.33.52.7.13 has a class of maximal subgroups of the form 24+6:A5×3, where 24+6 is a special 2-group with center Z24+6=24. …”
Get full text
Article -
9
Automatic Generation of Simulators for Processors Enhanced for Security in Virtualization
Published 2025-01-01“…To demonstrate the use of the simulator generator and the generated simulator, three case studies are considered - simulation of RISC-V with HyperWall, simulation of RISC-V with bit-serial dot-product unit, and simulation of RISC-V with Galois Field arithmetic extension. The paper concludes that the proposed approaches help in accurately simulating the overhead due to security in virtualization and also in providing flexibility to the designer to simulate the desired processor configurations.…”
Get full text
Article -
10
Cooperative and Adaptive Network Coding for Gradient Based Routing in Wireless Sensor Networks with Multiple Sinks
Published 2017-01-01“…The aggregation is performed by means of linear combinations of random coefficients of a finite Galois Field of variable size GF(2S) at each node and the decoding is performed by means of Gaussian elimination. …”
Get full text
Article