Results 11 to 20 of about 2,395,070 (371)

On Compression of Data Encrypted with Block Ciphers [PDF]

open access: green2009 Data Compression Conference, 2009
This paper investigates compression of data encrypted with block ciphers, such as the Advanced Encryption Standard (AES). It is shown that such data can be feasibly compressed without knowledge of the secret key. Block ciphers operating in various chaining modes are considered and it is shown how compression can be achieved without compromising ...
Demijan Klinc   +4 more
  +8 more sources

New Methodology of Block Cipher Analysis using Chaos Game [PDF]

open access: goldITB Journal of Information and Communication Technology, 2011
Block cipher analysis covers randomness analysis and cryptanalysis. This paper proposes a new method potentially used for randomness analysis and cryptanalysis. The method uses true random sequence concept as a reference for measuring randomness level of
Budi Sulistyo   +3 more
doaj   +3 more sources

On some block ciphers and imprimitive groups [PDF]

open access: greenApplicable Algebra in Engineering, Communication and Computing, 2008
The group generated by the round functions of a block ciphers is a widely investigated problem. We identify a large class of block ciphers for which such group is easily guaranteed to be primitive. Our class includes the AES and the SERPENT.
A. Caranti   +2 more
openalex   +4 more sources

Importance of S-Blocks in Modern Block Ciphers [PDF]

open access: bronzeInternational Journal of Computer Network and Information Security, 2012
There is a new approach to determine the degree of cryptographic S-boxes suitability. This approach is based on estimating the number of transformation cycles required for a cipher to achieve differential and linear nature of the state typical for random substitution of the appropriate degree.
Lisitskaya I.V.   +2 more
openalex   +3 more sources

Survey of Lightweight Block Cipher [PDF]

open access: yesJisuanji kexue, 2023
With the rapid development of information technology,human beings are entering the era of ubiquitous connectivity,where billions of Internet of Things(IoT) devices are connected to the network.The continuous growth of network attacks targeting user ...
ZHONG Yue, GU Jieming, CAO Honglin
doaj   +1 more source

New mode of operation inspired by the braid of long hair [PDF]

open access: yesRevista Română de Informatică și Automatică, 2023
In cryptography, a mode of operation is the way of processing plaintext and encrypted text blocks within a block cipher algorithm, or it is the presentation of a method of chaining blocks in a block cipher.
Hana ALI-PACHA   +2 more
doaj   +1 more source

Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2023
We consider the design of a tweakable block cipher from a block cipher whose inputs and outputs are of size n bits. The main goal is to achieve 2n security with a large tweak (i.e., more than n bits). Previously, Mennink at FSE’15 and Wang et al.
Yaobin Shen, François-Xavier Standaert
doaj   +1 more source

Chaghri - A FHE-friendly Block Cipher

open access: yesConference on Computer and Communications Security, 2022
The Recent progress in practical applications of secure computation protocols has also attracted attention to the symmetric-key primitives underlying them.
T. Ashur, M. Mahzoun, Dilara Toprakhisar
semanticscholar   +1 more source

BipBip: A Low-Latency Tweakable Block Cipher with Small Dimensions

open access: yesIACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
Recently, a memory safety concept called Cryptographic Capability Computing (C3) has been proposed. C3 is the first memory safety mechanism that works without requiring extra storage for metadata and hence, has the potential to significantly enhance the ...
Yanis Belkheyar   +4 more
semanticscholar   +1 more source

Lightweight Block Cipher Security Evaluation Based on Machine Learning Classifiers and Active S-Boxes

open access: yesIEEE Access, 2021
Machine learning has recently started to gain the attention of cryptographic researchers, notably in block cipher cryptanalysis. Most of these machine learning-based approaches are black box attacks that are cipher-specific.
Ting Rong Lee   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy