User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
 Views 7
 Downloands 1
On the Construction of Low-latency 32 × 32 Binary MDS Matrices from GHadamard Matrices
2021
Journal:  
International Journal of Information Security Science
Author:  
Abstract:

In this paper, we generate new hardware efficient involutory 32 × 32 binary Maximum Distance Separable (MDS) diffusion layers with branch number 5. In our construction method, the idea used in Generalised Hadamard (GHadamard) matrix form is applied when generating these diffusion layers. We construct lightweight circuits by applying Boyar’s global optimization heuristic (BP) to these diffusion layers. Hence, new 32 × 32 binary involutory MDS matrices with the best-known implementation cost (78 XORs) and depth 4 are generated. The obtained result is the same with the previous result given in [1], and we show that the diffusion layer given in [1] can also be obtained directly by using our construction method. As a result, we give thirteen more new involutory 32 × 32 binary MDS matrices with the best-known result.

Keywords:

null
2021
Author:  
0
2021
Author:  
Citation Owners
Information: There is no ciation to this publication.
Similar Articles












International Journal of Information Security Science

Field :   Mühendislik

Journal Type :   Uluslararası

Metrics
Article : 62
Cite : 6
International Journal of Information Security Science