Bitwise XOR linear space creation through permutation and the ease to enable XOR-free processes. [PDF]
Shetty S +3 more
europepmc +1 more source
Improved Side-Channel Attack on CTR DRBG Using a Clustering Algorithm. [PDF]
Han J, Han DG.
europepmc +1 more source
Digital image encryption utilizing high-dimensional cellular neural networks and lower-upper triangular decomposition of matrix. [PDF]
Tao L, Liang X, Han L, Hu B.
europepmc +1 more source
Recommendation for block cipher modes of operation :
Morris J. Dworkin
openalex +1 more source
Hyperchaotic color image encryption using eight-base DNA complementary rules and extended Zigzag transform. [PDF]
Yang B.
europepmc +1 more source
Known-IV Attacks on Triple Modes of Operation of Block Ciphers [PDF]
Deukjo Hong +6 more
openalex +1 more source
IAESR: IoT-oriented authenticated encryption based on iShadow round function. [PDF]
Zhang Y +5 more
europepmc +1 more source
Securing Embedded System from Code Reuse Attacks: A Lightweight Scheme with Hardware Assistance. [PDF]
An Z, Wang W, Li W, Li S, Zhang D.
europepmc +1 more source
A new multiple image encryption algorithm using hyperchaotic systems, SVD, and modified RC5. [PDF]
Alexan W +6 more
europepmc +1 more source
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers [PDF]
Deukjo Hong +6 more
openalex +1 more source

