Results 91 to 100 of about 10,636 (192)

A new S-box pattern generation based on chaotic enhanced logistic map: case of 5-bit S-box

open access: yesCybersecurity
Cryptography plays consistently an essential role in securing any sort of communications or data broadcast over the network. Since the security of any designed block cipher algorithm is related to its Substitution box (S-box), several efforts have been ...
Ismail El Gaabouri   +3 more
doaj   +1 more source

Cryptanalysis of QARMAv2

open access: yesIACR Transactions on Symmetric Cryptology
QARMAv2 is a general-purpose and hardware-oriented family of lightweight tweakable block ciphers (TBCs) introduced in ToSC 2023. QARMAv2, as a redesign of QARMAv1 with a longer tweak and tighter security margins, is also designed to be suitable for ...
Hosein Hadipour, Yosuke Todo
doaj   +1 more source

Atraumatic Reciprocal Scapula Fracture - A Case Report and Review of Literature. [PDF]

open access: yesJ Orthop Case Rep, 2023
Sood C   +4 more
europepmc   +1 more source

GOP candidates unite to attack the media in the third presidential debate [PDF]

open access: yes, 2015
Last week, the Republican Party held its third debate in their presidential primary. Jenny Tatsak writes that the debate was characterized by successful attacks from Senator Ted Cruz on the CNBC debate moderators, and an effective defense from Senator ...
Tatsak, Jenny
core  

Revisiting Related-Key Boomerang Attacks on AES Using Computer-Aided Tool [PDF]

open access: bronze, 2022
Patrick Derbez   +3 more
openalex   +1 more source

Decorrelation: A Theory for Block Cipher Security [PDF]

open access: yes, 2018
Pseudorandomness is a classical model for the security of block ciphers. In this paper we propose convenient tools in order to study it in connection with the Shannon Theory, the Carter-Wegman universal hash functions paradigm, and the Luby-Rackoff ...
Vaudenay, Serge
core  

Home - About - Disclaimer - Privacy