Results 21 to 30 of about 124,770 (378)
How to distinguish between a block cipher and a random permutation by lowering the input entropy [PDF]
IEEE 35th International Carnahan Conference on Security Technology. Londres, 16-19 October 2001A novel cryptanalysis technique is presented, and its suitability for distinguishing a block cipher algorithm or a hash function from a random permutation is ...
González-Tablas, Ana Isabel+3 more
core +3 more sources
Comparison analysis of stream cipher algorithms for digital communication [PDF]
The broadcast nature of radio communication such as in the HF (High Frequency) spectrum exposes the transmitted information to unauthorized third parties. Confidentiality is ensured by employing cipher system.
Mat Sidek, Abd. Rahim+1 more
core +1 more source
Нотный текст загадочных канонов: код или шифр?
Предметом изучения в статье выступает феномен музыкального кода, который рассматривается на материале произведений, относящихся к особому жанру старинной музыки -загадочным канонам. Автор рассматривает код как необходимое условие музыкальной коммуникации,
Юферова, Ольга Александровна
doaj +1 more source
CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks
Traditionally, countermeasures against physical attacks are integrated into the implementation of cryptographic primitives after the algorithms have been designed for achieving a certain level of cryptanalytic security.
Christof Beierle+3 more
semanticscholar +1 more source
The New Block Cipher Design (Tigris Cipher) [PDF]
Abstract—In the present paper we have proposed a new variant of AES cipher with high level of security and an elegant construction called TIGRIS cipher. The TIGRIS name has been derived from one of the two famous rivers in Iraq. The proposed TIGRIS cipher is a revision for the proposed Euphrates cipher which has already been published.
Abdul Monem S. Rahma+2 more
openaire +1 more source
Proposal to Complex DES Security Using Diffie Hellman Injection [PDF]
Data Encryption Standard (DES) is based on a round of starters, from the results of the use of multi-stage permutation and replacement to the more complex algorithm which adopts the symmetric key.
Shatha habeeb Jafar
doaj +1 more source
The Importance of Creativity in the Sportification of Breakdance
Many historical works have attempted to reveal the process of the sportification of physical activity that originated in the eighteenth century. The process of sportification can be divided into three basic mechanisms: The institutionalization of ...
Zhi Yang, YuJie Bai, MingTao Wei
doaj +1 more source
A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal+2 more
core +2 more sources
This paper introduces QARMA, a new family of lightweight tweakable block ciphers targeted at applications such as memory encryption, the generation of very short tags for hardware-assisted prevention of software exploitation, and the construction of ...
R. Avanzi
semanticscholar +1 more source