Results 201 to 210 of about 9,083 (227)
A combinatory approach of non-chain ring and henon map for image encryption application. [PDF]
Mohi Ud Din S +4 more
europepmc +1 more source
A secure and efficient image encryption scheme based on chaotic systems and nonlinear transformations. [PDF]
Alexan W, Shabasy NHE, Ehab N, Maher EA.
europepmc +1 more source
Secure medical image encryption with hyperelliptic curve based S-boxes. [PDF]
Alali AS +4 more
europepmc +1 more source
Secure gray image sharing framework with adaptive key generation using image digest. [PDF]
Nithya C +7 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Differential-Linear Cryptanalysis Revisited
Journal of Cryptology, 2015Block ciphers are arguably the most widely used type of cryptographic primitives. We are not able to assess the security of a block cipher as such, but only its security against known attacks. The two main classes of attacks are linear and differential attacks and their variants.
Gregor Leander +2 more
openaire +7 more sources
Linear and Differential Cryptanalysis
2020In this chapter, we will discuss two important types of cryptanalysis: linear and differential cryptanalysis. To explain how to merge theoretical concepts with the practical, in the beginning we will go through a set of basic concepts and advanced techniques on how these two types of cryptanalysis can be implemented by professionals.
Stefania Loredana Nita +1 more
openaire +2 more sources
Differential cryptanalysis of RC5
European Transactions on Telecommunications, 1997AbstractIn this paper we investigate the strength of the secret‐key algorithm RC5 proposed by Ron Rivest. The target version of RC5 works on words of 32 bits, has 12 rounds and a user‐selected key of 128 bits. Kaliski and Yin estimated the strength of RC5 by differential and linear cryptanalysis.
Willi Meier, Lars R. Knudsen
openaire +2 more sources

