Results 11 to 20 of about 44,791 (329)

Lightweight Block Cipher Security Evaluation Based on Machine Learning Classifiers and Active S-Boxes

open access: yesIEEE Access, 2021
Machine learning has recently started to gain the attention of cryptographic researchers, notably in block cipher cryptanalysis. Most of these machine learning-based approaches are black box attacks that are cipher-specific.
Ting Rong Lee   +4 more
doaj   +3 more sources

Loong: A Family of Involutional Lightweight Block Cipher Based on SPN Structure

open access: yesIEEE Access, 2019
In past few years, as security ciphers in the Internet of Things (IoT), the research of lightweight block cipher has attracted tremendous attention in cryptography. The SPN structure has been widely used in the design of block cipher.
Bo-Tao Liu   +4 more
doaj   +3 more sources

Tweakable Block Ciphers [PDF]

open access: yesJournal of Cryptology, 2002
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Liskov, Moses   +2 more
openaire   +4 more sources

Proposal of New Block Cipher Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2010
Speed and complexity are two important properties in the block cipher.The block length of the block cipher controls these two aspects. The speedlimitation enforces the designer to build block cipher system as hardwareprototype.
Hilal Hadi Salih   +2 more
doaj   +1 more source

Matrix Power Function Based Block Cipher Operating in CBC Mode

open access: yesMathematics, 2022
In our previous study, we proposed a perfectly secure Shannon cipher based on the so-called matrix power function. There we also introduced a concept of single round symmetric encryption, i.e., we used the matrix power function together with some rather ...
Lina Dindiene   +3 more
doaj   +1 more source

COUNTER MODE DEVELOPMENT FOR BLOCK CIPHER OPERATIONS [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2012
There are two basic types of symmetric cipher: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer. Stream ciphers operate on streams of plaintext and ciphertext one bit or
Ali M. Sagheer, Ahmed T. Suod
doaj   +1 more source

Efficient Implementation of PRESENT and GIFT on Quantum Computers

open access: yesApplied Sciences, 2021
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key ...
Kyungbae Jang   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy