Results 121 to 130 of about 3,394 (194)

A Secure and Efficient White-Box Implementation of SM4. [PDF]

open access: yesEntropy (Basel)
Hu X   +8 more
europepmc   +1 more source

Peer-to-Peer User Identity Verification Time Optimization in IoT Blockchain Network. [PDF]

open access: yesSensors (Basel), 2023
Kairaldeen AR   +3 more
europepmc   +1 more source

Securing digital images: A chaos-driven scrambling algorithm using the Rössler system. [PDF]

open access: yesPLoS One
Zulfiqar N   +7 more
europepmc   +1 more source

Post-quantum Security of Key-Alternating Feistel Ciphers

open access: yes
Since Kuwakado and Morii's work (ISIT 2010 & ISITA 2012), it is known that the classically secure 3-round Luby-Rackoff PRP and Even-Mansour cipher become insecure against an adversary equipped with quantum query access. However, while this query model (the so-called Q2 model) has led to many more attacks, it seems that restricting the adversary to ...
Basak, Jyotirmoy   +7 more
openaire   +1 more source

Home - About - Disclaimer - Privacy