Results 151 to 160 of about 26,610 (180)
Secure data transmission through fractal-based cryptosystem: a Noor iteration approach. [PDF]
Negi D, Kumar R, Kumar V, Dhaka A.
europepmc +1 more source
Guessing less and better: improved attacks on GIFT-64. [PDF]
Canale F, Naya-Plasencia M.
europepmc +1 more source
Intelligent decision-making framework for selecting optimized substitution boxes in modern block cipher design. [PDF]
Khan M.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Journal of Cryptology, 2016
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Genkin, Daniel +2 more
openaire +2 more sources
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Genkin, Daniel +2 more
openaire +2 more sources
2008
The stream cipher Rabbit is one candidate to the ECRYPT Stream Cipher Project (eSTREAM) on the third evaluation phase. It has a 128-bit key, 64-bit IV and 513-bit internal state. Currently, only one paper [1] studied it besides a series of white papers by the authors of Rabbit.
Lu Y., Wang H., Ling S.
openaire +1 more source
The stream cipher Rabbit is one candidate to the ECRYPT Stream Cipher Project (eSTREAM) on the third evaluation phase. It has a 128-bit key, 64-bit IV and 513-bit internal state. Currently, only one paper [1] studied it besides a series of white papers by the authors of Rabbit.
Lu Y., Wang H., Ling S.
openaire +1 more source
International Journal of Applied Cryptography
Summary: In [Lect. Notes Comput. Sci. 10624, 217--243 (2017; Zbl 1420.94094)], \textit{S. Rønjom} et al. reported Yoyo tricks on generic rounds of SPNs. Then they applied it to AES and found the most effective way to distinguish AES in several rounds. \textit{R. Saha} et al. [Secur. Commun. Netw.
Mondal, Sandip Kumar +3 more
openaire +2 more sources
Summary: In [Lect. Notes Comput. Sci. 10624, 217--243 (2017; Zbl 1420.94094)], \textit{S. Rønjom} et al. reported Yoyo tricks on generic rounds of SPNs. Then they applied it to AES and found the most effective way to distinguish AES in several rounds. \textit{R. Saha} et al. [Secur. Commun. Netw.
Mondal, Sandip Kumar +3 more
openaire +2 more sources
2009
Classical ciphers are used to encrypt plaintext messages written in a natural language in such a way that they are readable for sender or intended recipient only. Many classical ciphers can be broken by brute-force search through the key-space. One of the pertinent problems arising in automated cryptanalysis is the plaintext recognition.
Otokar Grošek, Pavol Zajac
openaire +1 more source
Classical ciphers are used to encrypt plaintext messages written in a natural language in such a way that they are readable for sender or intended recipient only. Many classical ciphers can be broken by brute-force search through the key-space. One of the pertinent problems arising in automated cryptanalysis is the plaintext recognition.
Otokar Grošek, Pavol Zajac
openaire +1 more source

