Results 91 to 100 of about 10,636 (192)
A new S-box pattern generation based on chaotic enhanced logistic map: case of 5-bit S-box
Cryptography plays consistently an essential role in securing any sort of communications or data broadcast over the network. Since the security of any designed block cipher algorithm is related to its Substitution box (S-box), several efforts have been ...
Ismail El Gaabouri +3 more
doaj +1 more source
Search framework for neutral bits and boomerangs in SHA‐1 collision attacks [PDF]
Degang Li, Yang Yang, Guang Zeng
openalex +1 more source
QARMAv2 is a general-purpose and hardware-oriented family of lightweight tweakable block ciphers (TBCs) introduced in ToSC 2023. QARMAv2, as a redesign of QARMAv1 with a longer tweak and tighter security margins, is also designed to be suitable for ...
Hosein Hadipour, Yosuke Todo
doaj +1 more source
Improved boomerang attacks on round‐reduced SM3 and keyed permutation of BLAKE‐256 [PDF]
Dongxia Bai +3 more
openalex +1 more source
Atraumatic Reciprocal Scapula Fracture - A Case Report and Review of Literature. [PDF]
Sood C +4 more
europepmc +1 more source
GOP candidates unite to attack the media in the third presidential debate [PDF]
Last week, the Republican Party held its third debate in their presidential primary. Jenny Tatsak writes that the debate was characterized by successful attacks from Senator Ted Cruz on the CNBC debate moderators, and an effective defense from Senator ...
Tatsak, Jenny
core
Creation of New Antimicrobial Peptides. [PDF]
Galzitskaya OV.
europepmc +1 more source
Revisiting Related-Key Boomerang Attacks on AES Using Computer-Aided Tool [PDF]
Patrick Derbez +3 more
openalex +1 more source
Prospects for Realizing International Women's Rights Law Through Local Governance: the Case of Cities for CEDAW. [PDF]
Runyan AS, Sanders R.
europepmc +1 more source
Decorrelation: A Theory for Block Cipher Security [PDF]
Pseudorandomness is a classical model for the security of block ciphers. In this paper we propose convenient tools in order to study it in connection with the Shannon Theory, the Carter-Wegman universal hash functions paradigm, and the Luby-Rackoff ...
Vaudenay, Serge
core

