Stafford E. Tavares
Queen's University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Stafford E. Tavares.
international cryptology conference | 1985
A. F. Webster; Stafford E. Tavares
The ideas of completeness and the avalanche effect were first introduced by Kam and Davida [1] and Feistel [2], respectively. If a cryptographic transformation is complete, then each ciphertext bit must depend on all of the plaintext bits. Thus, if it were possible to find the simplest Boolean expression for each ciphertext bit in terms of the plaintext bits, each of those expressions would have to contain all of the plaintext bits if the function was complete. Alternatively, if there is at least one pair of n-bit plaintext vectors X and Xi that differ only in bit i, and f(X) and f(Xi) differ at least in bit j for all
international cryptology conference | 1989
Gerald C. Chick; Stafford E. Tavares
Journal of Cryptology | 1990
Carlisle Adams; Stafford E. Tavares
\{ (i,j)|1 \leqslant i,j \leqslant n\}
IEEE Journal on Selected Areas in Communications | 1986
P. A. Scott; Stafford E. Tavares; Lloyd E. Peppard
IEEE Transactions on Information Theory | 1990
Carlisle Adams; Stafford E. Tavares
then the function f must be complete.
theory and application of cryptographic techniques | 1991
M. H. Dawson; Stafford E. Tavares
We show how to create a master key scheme for controlling access to a set of services. Each master key is a concise representation for a list of service keys, such that only service keys in this list can be computed easily from the master key. Our scheme is more flexible than others, permitting hierarchical organization and expansion of the set of services.
international cryptology conference | 1989
Carlisle Adams; Stafford E. Tavares
We describe a design procedure for the s-boxes of private key cryptosystems constructed as substitution-permutation networks (DES-like cryptosystems). Our procedure is proven to construct s-boxes which are bijective, are highly nonlinear, possess the strict avalanche criterion, and have output bits which act (vitually) independently when any single input bit is complemented. Furthermore, our procedure is very efficient: we have generated approximately 60 such 4 × 4 s-boxes in a few seconds of CPU time on a SUN workstation.
Journal of Cryptology | 1996
Howard M. Heys; Stafford E. Tavares
Multiplication in the finite field GF(2^{m} ) has particular computational advantages in data encryption systems. This paper presents a new algorithm for performing fast multiplication in GF(2^{m} ), which is O(m) in computation time and implementation area. The bit-slice architecture of a serial-in-serial-out modulo multiplier is described and the circuit details given. The design is highly regular, modular, and well-suited for VLSI implementation. The resulting multiplier will have application in algorithms based on arithmetic in large finite fields of characteristic 2, and which require high throughput.
IEEE Transactions on Computers | 1995
Howard M. Heys; Stafford E. Tavares
Two general classes of binary bent sequences, bent-based and linear-based, are introduced. Algorithms that allow easy generation of bent sequences from either class are given. Based on some simple computation and a computer search, the authors conjecture a lower bound on the total number of binary bent sequences of a given order. This lower bound is exact for bent sequences of order 16; a list is included from which all such sequences can be derived. >
theory and application of cryptographic techniques | 2001
Liam Keliher; Henk Meijer; Stafford E. Tavares
The security of DES-like cryptosystems depends heavily on the strength of the Substitution boxes (S-boxes) used. The design of new S-boxes is therefore an important concern in the creation of new and more secure cryptosystems. The full set of design criteria for the S-boxes of DES has never been released and a complete set has yet to be proposed in the open literature. This paper introduces a unified S-box design framework based on information theory and illustrates how it provides immunity to the differential attack.