Results 221 to 230 of about 33,779 (275)
Some of the next articles are maybe not open access.
Journal of Cryptology, 2016
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Genkin, Daniel +2 more
openaire +2 more sources
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Genkin, Daniel +2 more
openaire +2 more sources
Journal of Computing Theories and Applications
The rapidly evolving landscape of cryptanalysis necessitates an urgent and detailed exploration of the high-degree non-linear functions that govern the relationships between plaintext, key, and encrypted text.
Ajeet Singh +2 more
semanticscholar +1 more source
The rapidly evolving landscape of cryptanalysis necessitates an urgent and detailed exploration of the high-degree non-linear functions that govern the relationships between plaintext, key, and encrypted text.
Ajeet Singh +2 more
semanticscholar +1 more source
Cryptanalysis of Image Ciphers With Permutation-Substitution Network and Chaos
IEEE transactions on circuits and systems for video technology (Print), 2020In recent decades, the introduction of chaos to image encryption has drawn worldwide attention. The permutation-substitution architecture has been widely applied, and chaotic systems are generally employed to produce the required encryption elements ...
Junxin Chen, Lei Chen, Yicong Zhou
semanticscholar +1 more source
2008
The stream cipher Rabbit is one candidate to the ECRYPT Stream Cipher Project (eSTREAM) on the third evaluation phase. It has a 128-bit key, 64-bit IV and 513-bit internal state. Currently, only one paper [1] studied it besides a series of white papers by the authors of Rabbit.
Lu Y., Wang H., Ling S.
openaire +1 more source
The stream cipher Rabbit is one candidate to the ECRYPT Stream Cipher Project (eSTREAM) on the third evaluation phase. It has a 128-bit key, 64-bit IV and 513-bit internal state. Currently, only one paper [1] studied it besides a series of white papers by the authors of Rabbit.
Lu Y., Wang H., Ling S.
openaire +1 more source
Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding
Expert systems with applications, 2023Heping Wen, Yiting Lin
semanticscholar +1 more source
Exhaustive Cryptanalysis of the NBS Data Encryption Standard
Democratizing Cryptography, 2022W. Diffie, M. Hellman
semanticscholar +1 more source
A Deeper Look at Machine Learning-Based Cryptanalysis
IACR Cryptology ePrint Archive, 2021Adrien Benamira +3 more
semanticscholar +1 more source
Differential Cryptanalysis in the Fixed-Key Model
IACR Cryptology ePrint Archive, 2022Tim Beyne, V. Rijmen
semanticscholar +1 more source
Enhancing Differential-Neural Cryptanalysis
International Conference on the Theory and Application of Cryptology and Information Security, 2022Zhenzhen Bao +4 more
semanticscholar +1 more source

