Results 31 to 40 of about 164 (126)
Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes
Since Knudsen and Rijmen proposed the known-key attacks in ASIACRYPT 2007, the open-key model becomes more and more popular. As the other component of the open-key model, chosen-key model was applied to the full attacks on AES-256 by Biryukov et al.
Xiaoyang Dong, Xiaoyun Wang
doaj +1 more source
SLIM: A Lightweight Block Cipher for Internet of Health Things
Nowadays, there is a strong demand for increasing the protection of resource-constrained devices such as Radio frequency identification (RFID) systems. Current cryptographic algorithms are sufficient for high-resource desktop computers.
Bassam Aboushosha +4 more
doaj +1 more source
A Modification of TEA Block Cipher Algorithm for Data Security (MTEA) [PDF]
This paper attempts to develop a simple, stronger and safer cryptographic algorithm which would not only be a secure one, but also reduces total time taken for encryption and decryption.
Gaidaa Saeed Mahdi
doaj +1 more source
Security Establishment in ADS-B by Format-Preserving Encryption and Blockchain Schemes
In the next generation modernization plan, the automatic dependent surveillance-broadcast (ADS-B) system plays a pivotal role. However, the ADS-B’s low level of security and its vulnerabilities have raised valid concerns.
Jamal Habibi Markani +3 more
doaj +1 more source
Type-3 Feistel Network of The 128-bits Block Size Improved Blowfish Cryptographic Encryption [PDF]
In this paper, a new secret-key block cipher called 128-bits Blowfish isproposed which is an evolutionary improvement of 64-bits Blowfish designed tomeet the requirements of the Advanced Encryption Standard (AES) to increasesecurity and to improve ...
Ashwaq T. Hashim
doaj +1 more source
Dynamic Rounds Chaotic Block Cipher Based on Keyword Abstract Extraction
According to the keyword abstract extraction function in the Natural Language Processing and Information Retrieval Sharing Platform (NLPIR), the design method of a dynamic rounds chaotic block cipher is presented in this paper, which takes into account ...
Juan Wang, Qun Ding
doaj +1 more source
On the Feistel Counterpart of the Boomerang Connectivity Table
At Eurocrypt 2018, Cid et al. introduced the Boomerang Connectivity Table (BCT), a tool to compute the probability of the middle round of a boomerang distinguisher from the description of the cipher’s Sbox(es). Their new table and the following works led
Hamid Boukerrou +4 more
doaj +1 more source
NBC is a family of block ciphers using Generalized Feistel structure, designed by Xu Hong et al. There are three block and key sizes,i.e.,128/128, 128/256 and 256/256. A 16-bit Sbox is involved in the cipher as the non-linear component.
Yang Jiangshuai +3 more
doaj +1 more source
Improvement of the Minimal‐Guess‐Basis MILP Model and Its Application to ESF
The guess‐and‐determine technique find wide applications in the recovery of unknown variables within given system of relations. The fundamental concept behind this technique involves guessing certain unknown variables and deducing the remaining ones based on the relational system.
Lingchen Li +5 more
wiley +1 more source
Metabolism of Epoxidised Withanolides by a Generalist and a Specialist Insect Species
Larvae of Heliothis (Chloridea) virescence and subflexa have the ability to convert the epoxidized terpenoid 4β‐hydroxywithanolide E (4BHWE) to withanolide S. The conversion is found by feeding the larvae an artificial diet supplemented with 13C‐labeled 4BHWE.
Marie Pauline Sell +4 more
wiley +1 more source

