Results 11 to 20 of about 44,791 (329)
Machine learning has recently started to gain the attention of cryptographic researchers, notably in block cipher cryptanalysis. Most of these machine learning-based approaches are black box attacks that are cipher-specific.
Ting Rong Lee +4 more
doaj +3 more sources
Loong: A Family of Involutional Lightweight Block Cipher Based on SPN Structure
In past few years, as security ciphers in the Internet of Things (IoT), the research of lightweight block cipher has attracted tremendous attention in cryptography. The SPN structure has been widely used in the design of block cipher.
Bo-Tao Liu +4 more
doaj +3 more sources
Secure Image Encryption Using Chaotic, Hybrid Chaotic and Block Cipher Approach. [PDF]
Chaudhary N, Shahi TB, Neupane A.
europepmc +2 more sources
FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher. [PDF]
Abed S, Jaffal R, Mohd BJ, Alshayeji M.
europepmc +2 more sources
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Liskov, Moses +2 more
openaire +4 more sources
Proposal of New Block Cipher Algorithm [PDF]
Speed and complexity are two important properties in the block cipher.The block length of the block cipher controls these two aspects. The speedlimitation enforces the designer to build block cipher system as hardwareprototype.
Hilal Hadi Salih +2 more
doaj +1 more source
Matrix Power Function Based Block Cipher Operating in CBC Mode
In our previous study, we proposed a perfectly secure Shannon cipher based on the so-called matrix power function. There we also introduced a concept of single round symmetric encryption, i.e., we used the matrix power function together with some rather ...
Lina Dindiene +3 more
doaj +1 more source
On the Design of Secure and Fast Double Block Length Hash Functions [PDF]
In this work the security of the rate-1 double block length hash functions, which based on a block cipher with a block length of n-bit and a key length of 2n-bit, is reconsidered.
Chen, Kefei, Gong, Z., Lai, X.J.
core +22 more sources
COUNTER MODE DEVELOPMENT FOR BLOCK CIPHER OPERATIONS [PDF]
There are two basic types of symmetric cipher: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer. Stream ciphers operate on streams of plaintext and ciphertext one bit or
Ali M. Sagheer, Ahmed T. Suod
doaj +1 more source
Efficient Implementation of PRESENT and GIFT on Quantum Computers
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key ...
Kyungbae Jang +5 more
doaj +1 more source

