Results 111 to 120 of about 9,083 (227)

XSL Block Ciphers’ Key-schedules with Resistance to Differential Cryptanalysis

open access: yesБезопасность информационных технологий, 2014
The paper discusses the resistance of XSL block ciphers to differential cryptanalysis. AES-like block ciphers with alternative key-schedules (increased performance and density) are given as an example.
Marina Aleksandrovna Pudovkina   +1 more
doaj  

Revisiting the shuffle of generalized Feistel structure

open access: yesCybersecurity
The Generalized Feistel Structure ( $$\texttt{GFS}$$ GFS ) is one of the most widely used frameworks in symmetric cipher design. In FES 2010, Suzaki and Minematsu strengthened the cryptanalysis security of $$\texttt{GFS}$$ GFS by searching for shuffles ...
Yincen Chen   +4 more
doaj   +1 more source

EVALUATION OF CRYPTOGRAPHIC ALGORITHMS [PDF]

open access: yes
This article represents a synthesis of the evaluation methods for cryptographic algorithms and of their efficiency within practical applications. It approaches also the main operations carried out in cryptanalysis and the main categories and methods of ...
Emil Simion, Mircea Andraşiu
core  

Practical and Provable Security against Differential and Linear Cryptanalysis for Substitution-Permutation Networks [PDF]

open access: bronze, 2001
Ju-Sung Kang   +5 more
openalex   +1 more source

On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis [PDF]

open access: bronze, 2002
Sangwoo Park   +4 more
openalex   +1 more source

ESTABLISHED WAYS TO ATTACK EVEN THE BEST ENCRYPTION ALGORITHM [PDF]

open access: yes
Which solution is the best – public key or private key encryption? This question cannot have a very rigorous, logical and definitive answer, so that the matter be forever settled :).
Alexandru Tabusca
core  

Differential and Linear Cryptanalysis of a Reduced-Round SC2000 [PDF]

open access: bronze, 2002
Hitoshi Yanami   +2 more
openalex   +1 more source

Home - About - Disclaimer - Privacy