Results 31 to 40 of about 2,395 (159)

A Review of Block Ciphers and Its Post-Quantum Considerations

open access: yesIEEE Access
Recent advances in cryptography aim to address threats posed by quantum computers. However, these advances have focused disproportionately on asymmetric schemes, while symmetric primitives like block ciphers have received less attention.
R. V. Chethana   +3 more
doaj   +1 more source

Linear Key-schedule’s Properties of the Smallpresent Block Cipher

open access: yesБезопасность информационных технологий, 2013
SmallPresent block cipher was presented to investigate attacks on the PRESENT block cipher in details. In the paper the resistance to linear cryptanalysis of this cipher with arbitrary linear key-schedule is under consideration.
Georgy Igorevich Khoruzhenko   +1 more
doaj  

Construction of diffusion layers based on cipher structures

open access: yes网络与信息安全学报, 2017
Taked diffusion layers of block cipher algorithms as the research object,lightweight diffusion layers were constructed by two cipher structures based on the characteristics of diffusion layers of lightweight block cipher algorithms,which were the ...
Peng-fei LI
doaj   +3 more sources

HCTR+: An Optimally Secure TBC-Based Accordion Mode

open access: yesIACR Transactions on Symmetric Cryptology
The design of tweakable wide-block ciphers has advanced significantly over the past two decades. This evolution began with the wide-block cipher by Naor and Reingold.
Nilanjan Datta   +4 more
doaj   +1 more source

Loong: A Family of Involutional Lightweight Block Cipher Based on SPN Structure

open access: yesIEEE Access, 2019
In past few years, as security ciphers in the Internet of Things (IoT), the research of lightweight block cipher has attracted tremendous attention in cryptography. The SPN structure has been widely used in the design of block cipher.
Bo-Tao Liu   +4 more
doaj   +1 more source

Design and Research of S-Box Based on Dynamic Strategy

open access: yesDianxin kexue, 2015
Block cipher encryption is the mainstream method of information security application,and it has been widely used in wireless sensor networks.S-box which is one of the core modules of block cipher algorithm has a direct and significant impact on the ...
Zhouquan Du   +4 more
doaj   +2 more sources

Differential fault analysis on PRINTcipher

open access: yesIET Networks, 2013
The new block cipher PRINTcipher was introduced in CHES 2010 as a lightweight block cipher for ‘integrated circuit’ or IC‐‘printing’ technology. The key of PRINTcipher consist of two sub‐key components where the first sub‐key is ‘XORed’ to the state in ...
Nasour Bagheri   +2 more
doaj   +1 more source

New Methodology of Block Cipher Analysis using Chaos Game [PDF]

open access: yesITB Journal of Information and Communication Technology, 2011
Block cipher analysis covers randomness analysis and cryptanalysis. This paper proposes a new method potentially used for randomness analysis and cryptanalysis. The method uses true random sequence concept as a reference for measuring randomness level of
Budi Sulistyo   +3 more
doaj  

Elastic Block Ciphers

open access: yes, 2004
We introduce a new concept of elastic block ciphers, symmetric-key encryption algorithms that for a variable size input do not expand the plaintext, (i.e., do not require plaintext padding), while maintaining the diffusion property of traditional block ciphers and adjusting their computational load proportionally to the size increase.
Cook, Debra L.   +2 more
openaire   +2 more sources

Perfect Block Ciphers with Small Blocks [PDF]

open access: yes, 2007
Existing symmetric encryption algorithms target messages consisting of elementary binary blocks of at least 64 bits. Some applications need a block cipher which operates over smaller and possibly nonbinary blocks, which can be viewed as a pseudo-random permutation of n elements.
Louis Granboulan, Thomas Pornin
openaire   +1 more source

Home - About - Disclaimer - Privacy