Results 41 to 50 of about 2,386,676 (394)

On Elastic Block Ciphers and Their Differential and Linear Cryptanalyses [PDF]

open access: yes, 2005
Motivated by applications such as databases with nonuniform field lengths, we introduce the concept of an elastic block cipher, a new approach to variable length block ciphers which incorporates fixed sized cipher components into a new network structure.
Cook, Debra L.   +2 more
core   +2 more sources

CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks

open access: yesIACR Cryptology ePrint Archive, 2019
Traditionally, countermeasures against physical attacks are integrated into the implementation of cryptographic primitives after the algorithms have been designed for achieving a certain level of cryptanalytic security.
Christof Beierle   +3 more
semanticscholar   +1 more source

Cryptanalysis of a chaotic block cipher with external key and its improved version [PDF]

open access: yes, 2006
Recently, Pareek et al. proposed a symmetric key block cipher using multiple one-dimensional chaotic maps. This paper reports some new findings on the security problems of this kind of chaotic cipher: 1) a number of weak keys exists; 2) some important ...
Alvarez   +12 more
core   +2 more sources

Grover on Korean Block Ciphers [PDF]

open access: yesApplied Sciences, 2020
The Grover search algorithm reduces the security level of symmetric key cryptography with n-bit security level to O(2n/2). In order to evaluate the Grover search algorithm, the target block cipher should be efficiently implemented in quantum circuits. Recently, many research works evaluated required quantum resources of AES block ciphers by optimizing ...
Kyoungbae Jang   +5 more
openaire   +2 more sources

A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]

open access: yes, 2018
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal   +2 more
core   +2 more sources

Parallel Implementation of PIPO and Its Application for Format Preserving Encryption

open access: yesIEEE Access, 2022
The PIPO block cipher, a domestic lightweight block cipher, was announced at ICISC’20. In particular, the bitslicing technique is implemented in the S-Layer for the PIPO block cipher.
Hyunji Kim   +5 more
doaj   +1 more source

The Block Cipher SC2000 [PDF]

open access: yes, 2002
In this paper, we propose a new symmetric key block cipher SC2000 with 128-bit block length and 128-,192-,256- bit key lengths. The block cipher is constructed by piling two layers: one is a Feistel structure layer and the other is an SPN structure layer. Each operation used in two layers is S-box or logical operation, which has been well studied about
Jun Yajima   +7 more
openaire   +1 more source

Quantitative Evaluation of Chaotic CBC Mode of Operation [PDF]

open access: yes, 2016
The cipher block chaining (CBC) block cipher mode of operation presents a very popular way of encrypting which is used in various applications. In previous research work, we have mathematically proven that, under some conditions, this mode of operation ...
Abidi, Abdessalem   +4 more
core   +3 more sources

Enhancing Embedded Data Security By Turns Cipher Block Chaining Mode Into Stream Cipher [PDF]

open access: yesEngineering and Technology Journal, 2009
In this paper, a secure data hiding method is introduced. It increases the security of embedded data through combining between the steganography and cryptography. First, the secrete message is divided into blocks with same size according to length of key
Salah Mahdi Saleh
doaj   +1 more source

Counter Mode of the Shannon Block Cipher Based on MPF Defined over a Non-Commuting Group

open access: yesMathematics, 2022
In this paper, we present a counter mode of a Shannon block cipher based on the matrix power function. We make use of the matrix power function to define a single round symmetric cipher.
Aleksejus Mihalkovich   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy