Results 161 to 170 of about 8,822 (201)
Decrypting chaotic visual ciphers via quasi quantum neural networks (Q²NNs). [PDF]
Manavalan G, Arnon S.
europepmc +1 more source
An IoT based remote medical diagnosis system using one time pad cipher over MQTT protocol. [PDF]
Kumar NR +5 more
europepmc +1 more source
An efficient image encryption scheme based on Lorenz system and quantum-inspired walks. [PDF]
Karmany M +4 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Differential-Linear Cryptanalysis Revisited
Journal of Cryptology, 2015zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Blondeau, Céline +2 more
openaire +6 more sources
Slender-Set Differential Cryptanalysis
Journal of Cryptology, 2011zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Borghoff, Julia +3 more
openaire +2 more sources
Quantum differential cryptanalysis
Journal of Computer Virology and Hacking Techniques, 2021The work is devoted to the study quantum versions of the differential cryptanalysis based on using a combination of the quantum minimum/maximum search algorithm and the quantum counting algorithm. We have estimated the complexity and the required resources for applying the quantum differential and quantum linear cryptanalysis to searching round keys of
openaire +1 more source
Impossible Differential Cryptanalysis
2023International ...
Boura, Christina, Naya-Plasencia, María
openaire +2 more sources
Differential cryptanalysis of RC5
European Transactions on Telecommunications, 1997AbstractIn this paper we investigate the strength of the secret‐key algorithm RC5 proposed by Ron Rivest. The target version of RC5 works on words of 32 bits, has 12 rounds and a user‐selected key of 128 bits. Kaliski and Yin estimated the strength of RC5 by differential and linear cryptanalysis.
Lars R. Knudsen, Willi Meier
openaire +1 more source
Linear and Differential Cryptanalysis
2020In this chapter, we will discuss two important types of cryptanalysis: linear and differential cryptanalysis. To explain how to merge theoretical concepts with the practical, in the beginning we will go through a set of basic concepts and advanced techniques on how these two types of cryptanalysis can be implemented by professionals.
Marius Iulian Mihailescu +1 more
openaire +1 more source
Differential Cryptanalysis of FEAL
1993FEAL was suggested as a software-oriented cryptosystem which can be easily and efficiently implemented on microprocessors. The structure of FEAL is similar to DES with a modified F function, initial and final permutations and key scheduling algorithm.
Eli Biham, Adi Shamir
openaire +1 more source

