Results 11 to 20 of about 20,803 (281)

Grover on Korean Block Ciphers

open access: yesApplied Sciences, 2020
The Grover search algorithm reduces the security level of symmetric key cryptography with n-bit security level to O(2n/2). In order to evaluate the Grover search algorithm, the target block cipher should be efficiently implemented in quantum circuits ...
Kyoungbae Jang   +5 more
doaj   +3 more sources

Survey and Benchmark of Block Ciphers for Wireless Sensor Networks [PDF]

open access: yesACM Transactions on Sensor Networks, 2006
Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without ...
Doumen, J.M., Hartel, P.H., Law, Y.W.
core   +5 more sources

Probability distributions of correlation and differentials in block ciphers

open access: yesJournal of Mathematical Cryptology, 2007
We study the probability distributions of difference propagation probabilities and input-output correlations for functions and block ciphers of given dimensions, for several of them for the first time.
Daemen Joan, Rijmen Vincent
doaj   +2 more sources

Secure and Robust Internet of Things with High-Speed Implementation of PRESENT and GIFT Block Ciphers on GPU

open access: yesApplied Sciences, 2022
With the advent of the Internet of Things (IoT) and cloud computing technologies, vast amounts of data are being created and communicated in IoT networks. Block ciphers are being used to protect these data from malicious attacks.
Hyunjun Kim    +4 more
doaj   +1 more source

Single-Byte Error-Based Practical Differential Fault Attack on Bit-Sliced Lightweight Block Cipher PIPO

open access: yesIEEE Access, 2022
With the recent development of the Internet of Things (IoT), related device use is increasing rapidly. As a result, accessing and hijacking the devices is an increasing security threat.
Seonghyuck Lim   +2 more
doaj   +1 more source

The influence of S-boxes on the arrival of the cipher to the state of random substitution

open access: yesРадіоелектронні і комп'ютерні системи, 2023
The subject of this study is the process of developing block symmetric ciphers with improved cryptographic stability indicators for solving the problems of information protection in information and communication systems.
Iryna Lysytska   +3 more
doaj   +1 more source

Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2023
We consider the design of a tweakable block cipher from a block cipher whose inputs and outputs are of size n bits. The main goal is to achieve 2n security with a large tweak (i.e., more than n bits). Previously, Mennink at FSE’15 and Wang et al.
Yaobin Shen, François-Xavier Standaert
doaj   +1 more source

Probabilistic Block Cipher [PDF]

open access: yesAnnals of Computer Science and Information Systems, 2018
This paper is devoted to the description of a new block cipher that will be applicable in the post-quantum era and will not need a lot of resources. The main advantages: probabilistic encryption, the cipher block chaining mode, the ability to transfer to distributed systems. All this combined with the use of PRNG, working on the Cremona transformations,
Dmitry Shishlyannikov   +2 more
openaire   +2 more sources

RAFA: Redundancies-assisted Algebraic Fault Analysis and its implementation on SPN block ciphers

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
Algebraic Fault Analysis (AFA) is a cryptanalysis for block ciphers proposed by Courtois et al., which incorporates algebraic cryptanalysis to overcome the complexity of manual analysis within the context of Differential Fault Analysis (DFA).
Zehong (Zephyr) Qiu, Fan Zhang
doaj   +1 more source

STUDY OF THE CRYPTOGRAPHIC STRENGTH OF THE S-BOX OBTAINED ON THE BASIS OF EXPONENTIATION MODULO

open access: yesScientific Journal of Astana IT University, 2022
This article presents one of the main transformations of symmetric block ciphers used to protect confidential information, a new method for obtaining a non-linear S block, and an analysis of the results obtained.
Ardabek Khompysh   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy