Results 81 to 90 of about 3,394 (194)
Decorrelation: A Theory for Block Cipher Security [PDF]
Pseudorandomness is a classical model for the security of block ciphers. In this paper we propose convenient tools in order to study it in connection with the Shannon Theory, the Carter-Wegman universal hash functions paradigm, and the Luby-Rackoff ...
Vaudenay, Serge
core
Feistel Ciphers with L 2-Decorrelation [PDF]
Recently, we showed how to strengthen block ciphers by decorrelation techniques. In particular, we proposed two practical block ciphers, one based on the GF(2n)-arithmetics, the other based on the x mod p mod 2n primitive with a prime p = 2n(1 + δ). In this paper we show how to achieve similar decorrelation with a prime p = 2n(1 - δ).
openaire +1 more source
Interactions Between Diurnal Warm Layers and Surface‐Layer Fronts
Abstract Previous studies have highlighted the individual importance of diurnal warm layers (DWLs) and surface‐layer fronts within the surface boundary layer (SBL) in regulating energy, momentum, and gas exchange between the atmosphere and the ocean. This study investigates the interactions between DWLs and surface‐layer fronts using field observations
Jen‐Ping Peng +8 more
wiley +1 more source
This paper proposes a DNA‐Dynamic Concurrent Permutation‐Diffusion Algorithm (DNA‐DCP‐DA) for secure image encryption, employing novel scaling chaotification models and advanced noncommutative DNA operations to address weaknesses in existing systems.
Mustafa Kamil Khairullah +5 more
wiley +1 more source
Design Trends and Comparative Analysis of Lightweight Block Ciphers for IoTs
This paper provides a comprehensive survey of 58 lightweight block ciphers (LWBCs) introduced between 2018 and 2025, designed specifically for securing resource-constrained environments such as the Internet of Things (IoTs).
Safia Meteb Al-Nofaie +2 more
doaj +1 more source
Random Permutation Statistics and An Improved Slide-Determine Attack on KeeLoq [PDF]
KeeLoq is a lightweight block cipher which is extensively used in the automotive industry. Its periodic structure, and overall simplicity makes it vulnerable to many different attacks.
Bard, GV, Courtois, NT
core
Studi Dan Implementasi Algoritma Blowfish Untuk Enkripsi Email [PDF]
The needs of information currently encourage the growth of information security methods. Art encryption and security is the cryptographic message is growing very fast right now.
Fathoni, Kholid +2 more
core
Links between Quantum Distinguishers Based on Simon’s Algorithm and Truncated Differentials
In this paper, we study the quantum security of block ciphers based on Simon’s period-finding quantum algorithm. We explored the relations between periodic functions and truncated differentials. The basic observation is that truncated differentials with
Zejun Xiang +7 more
doaj +1 more source
Research on Block Cipher Technology [PDF]
With the rapid advancement of information technology, Humanity will enter the era of the Internet of Things, with billions of IoT devices connected to the network, and network attacks targeting user privacy, network environment, etc.
Yin Yuanhao
doaj +1 more source
Integral attack on MIBS block cipher
The security of the block cipher MIBS against integral attack was analyzed and a 5-round distinguisher of MIBS was founded. Considering the equivalent structure of Feistel structure and the relation of master key and round key in the key expansion ...
Zhi-shu PAN +3 more
doaj +2 more sources

