Results 31 to 40 of about 1,151 (262)
Hybrid Code Lifting on Space-Hard Block Ciphers
There is a high demand for whitebox cryptography from the practical use of encryption in untrusted environments. It has been actively discussed for two decades since Chow et al. presented the whitebox implementation of DES and AES. The goal is to resist
Yosuke Todo, Takanori Isobe
doaj +1 more source
Automatic method for searching integral distinguishers of ARX block ciphers
Firstly,based on three subsets division property propagation technique,the propagation function of the K-set and L-set of ARX block ciphers was constructed respectively.All vectors in L-set affected the propagation of K-set when propagate through xored ...
Ya HAN, Mingsheng WANG
doaj +2 more sources
Improved Correlation Power Analysis on Bitslice Block Ciphers
Bitslice block ciphers have the advantage of allowing parallel computation using bitwise logical operations, and Boolean masking can be applied efficiently.
Jaeseung Han +4 more
doaj +1 more source
Cryptanalysis of HALFLOOP Block Ciphers
HALFLOOP is a family of tweakable block ciphers that are used for encrypting automatic link establishment (ALE) messages in high frequency radio, a technology commonly used by the military, other government agencies and industries which require high ...
Gregor Leander +2 more
doaj +1 more source
We introduce the concept of an elastic block cipher, which refers to stretching the supported block size of a block cipher to any length up to twice the original block size while incurring a computational workload that is proportional to the block size. We define a method for converting any existing block cipher into an elastic block cipher and mention
Cook, Debra L. +2 more
openaire +2 more sources
KOMBINASI CAESAR CIPHER DAN REVERSE CIPHER BERDASARKAN CIPHER BLOCK CHAINING
Communication in the current era of globalization is very developed. Many applications that can be used to facilitate communication. However, because of this convenience, the security of the information contained in it will be more easily hacked by irresponsible people. Cryptography is the science or art for security message.
Maulidyah Lailatun Najah +1 more
openaire +2 more sources
The New Block Cipher Design (Tigris Cipher) [PDF]
Abstract—In the present paper we have proposed a new variant of AES cipher with high level of security and an elegant construction called TIGRIS cipher. The TIGRIS name has been derived from one of the two famous rivers in Iraq. The proposed TIGRIS cipher is a revision for the proposed Euphrates cipher which has already been published.
Omar A. Dawood +2 more
openaire +1 more source
A Review of Block Cipher’s S-Boxes Tests Criteria [PDF]
The Symmetric Block cipher is a considerable encryption algorithm because of its straightforwardness, rapidity and strength and this cryptographic algorithm is employed in carrying out the encryption and decryption for most current security applications.
Auday H. Saeed AL-Wattar
doaj +1 more source
One to One Identification of Cryptosystem Using Fisher’s Discriminant Analysis
Distiguishing analysis is an important part of cryptanalysis. It is an important content of discriminating analysis that how to identify ciphertext is encrypted by which cryptosystems when it knows only ciphertext.
Xinyi Hu, Yaqun Zhao
doaj +1 more source
ABSTRACT Neuroblastoma is the most common extracranial solid tumor in early childhood. Its clinical behavior is highly variable, ranging from spontaneous regression to fatal outcome despite intensive treatment. The International Society of Pediatric Oncology Europe Neuroblastoma Group (SIOPEN) Radiology and Nuclear Medicine Specialty Committees ...
Annemieke Littooij +11 more
wiley +1 more source

