Cryptology ePrint Archive: Report 2015/812

We managed to reverse-engineer this S-Box and describe its unpublished structure. Our decomposition allows a much more efficient hardware implementation but the choice of the components used is puzzling from a cryptographic perspective.

This extended abstract does not explain \emph{how} we found this decomposition. We will describe our process in an extended version of this paper.