Results 71 to 80 of about 2,386,676 (394)

Modified forms of cipher block chaining

open access: yesComputers & Security, 1991
A long-standing proposal for modifying cipher block chaining to prevent data expansion is shown to be insecure in some circumstances. Different modifications are then presented which appear secure.
Mitchell, Chris J, Varadharajan, Vijay
openaire   +4 more sources

Characterization of fungal carbonyl sulfide hydrolase belonging to clade D β‐carbonic anhydrase

open access: yesFEBS Letters, EarlyView.
Here, we performed a functional analysis of the fungal enzymes belonging to clade D of the β‐class carbonic anhydrase family (β‐D‐CA). The β‐D‐CAs in the basidiomycete Gloeophyllum trabeum and the ascomycete Trichoderma harzianum showed very low activity in the hydration of CO2 but exhibited high activity in the hydrolysis of carbonyl sulfide (COS ...
Ryuka Iizuka   +6 more
wiley   +1 more source

Cryptanalysis of Reduced round SKINNY Block Cipher

open access: yesIACR Cryptology ePrint Archive, 2018
SKINNY is a family of lightweight tweakable block ciphers designed to have the smallest hardware footprint. In this paper, we present zero-correlation linear approximations and the related-tweakey impossible differential characteristics for different ...
S. Sadeghi, Tahere Mohammadi, N. Bagheri
semanticscholar   +1 more source

A histidine‐rich extension of the mitochondrial F0 subunit ATP6 from the ice worm Mesenchytraeus solifugus increases ATP synthase activity in bacteria

open access: yesFEBS Letters, EarlyView.
The glacier ice worm Mesenchytraeus solifugus survives year‐round at 0 °C. Its ATP6 subunit, which forms a regulatory component of the proton pore in mitochondrial ATP synthase, has a carboxy‐terminal extension not found in any other organism examined to date. Here, we show that fusion of this extension to the homologous AtpB protein in E. coli results
Truman Dunkley   +2 more
wiley   +1 more source

Construction of diffusion layers based on cipher structures

open access: yes网络与信息安全学报, 2017
Taked diffusion layers of block cipher algorithms as the research object,lightweight diffusion layers were constructed by two cipher structures based on the characteristics of diffusion layers of lightweight block cipher algorithms,which were the ...
Peng-fei LI
doaj   +3 more sources

Invariant Hopping Attacks on Block Ciphers [PDF]

open access: yesarXiv, 2020
Block ciphers are in widespread use since the 1970s. Their iterated structure is prone to numerous round invariant attacks for example in Linear Cryptanalysis (LC). The next step is to look at non-linear polynomial invariants cf. Eurocrypt'95. Until recently, researchers have found extremely few such attacks, with some impossibility results. Eventually
arxiv  

Survey and Benchmark of Block Ciphers for Wireless Sensor Networks [PDF]

open access: yes, 2006
Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without ...
Doumen, J.M., Hartel, P.H., Law, Y.W.
core   +3 more sources

Functional variation among LPMOs revealed by the inhibitory effects of cyanide and buffer ions

open access: yesFEBS Letters, EarlyView.
This study addresses the inhibition of lytic polysaccharide monooxygenases (LPMOs) by cyanide and explains how and why the magnitude of observed inhibitory effects depends on the way LPMO reactions are setup and on the type of LPMO. Enzymes known as lytic polysaccharide monooxygenases (LPMOs) are mono‐copper polysaccharide‐degrading peroxygenases that ...
Ole Golten   +10 more
wiley   +1 more source

Linear Key-schedule’s Properties of the Smallpresent Block Cipher

open access: yesБезопасность информационных технологий, 2013
SmallPresent block cipher was presented to investigate attacks on the PRESENT block cipher in details. In the paper the resistance to linear cryptanalysis of this cipher with arbitrary linear key-schedule is under consideration.
Georgy Igorevich Khoruzhenko   +1 more
doaj  

Improved Security Bound of (E/D)WCDM

open access: yesIACR Transactions on Symmetric Cryptology, 2021
In CRYPTO’16, Cogliati and Seurin proposed a block cipher based nonce based MAC, called Encrypted Wegman-Carter with Davies-Meyer (EWCDM), that gives 2n/3 bit MAC security in the nonce respecting setting and n/2 bit security in the nonce misuse setting ...
Nilanjan Datta   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy