Results 101 to 110 of about 6,661,504 (214)

Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model

open access: yesIACR Transactions on Symmetric Cryptology, 2020
We present two tweakable wide block cipher modes from doubly-extendable cryptographic keyed (deck) functions and a keyed hash function: double-decker and docked-double-decker.
Aldo Gunsing, Joan Daemen, Bart Mennink
doaj   +1 more source

Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds

open access: yesIACR Transactions on Symmetric Cryptology, 2017
The current paper studies the probability of differential characteristics for an unkeyed (or with a fixed key) construction. Most notably, it focuses on the gap between two probabilities of differential characteristics: probability with independent S-box
Anne Canteaut   +5 more
doaj   +1 more source

Linear cryptanalysis of pseudorandom functions [PDF]

open access: yes, 2015
Relatório de projeto de pesquisa.In this paper, we study linear relations propagating across block ciphers from the key input to the ciphertext (for a fixed plaintext block).
Freitas, Daniel Santana de   +2 more
core  

Plaintext Recovery in DES-like Cryptosystems Based on S-boxes with Embedded Parity Check [PDF]

open access: yes, 2013
We describe an approach for recovering the plaintext in block ciphers having a design structure similar to the Data Encryption Standard but with improperly constructed S-boxes.
Angelova, Vesela, Borissov, Yuri
core  

NaSHA [PDF]

open access: yes, 2009
We propose the NaSHA-(m, k, r) family of cryptographic hash functions, based on quasigroup transformations. We use huge quasigroups defined by extended Feistel networks from small bijections and a novel design principle: the quasigroup used in every ...
Jakimovski, Boro   +3 more
core  

Decorrelation: A Theory for Block Cipher Security [PDF]

open access: yes, 2018
Pseudorandomness is a classical model for the security of block ciphers. In this paper we propose convenient tools in order to study it in connection with the Shannon Theory, the Carter-Wegman universal hash functions paradigm, and the Luby-Rackoff ...
Vaudenay, Serge
core  

Optimasi Metode Blowfish untuk Mengamankan Password pada Kriptografi [PDF]

open access: yes, 2016
Berkembangnya ilmu komputerisasi, isu mengenai keamanan data baik dalam bentuk file maupun password menjadi sangat penting. Untuk menjaga keamanan pada data tersebut, makadikenal salah satu teknik yaitu kriptografi. Adapun algoritma yang digunakan adalah
Astuti1, Y. P. (Yani)   +2 more
core  

Quasigroups generated by shift registers and Feistel networks

open access: yesQuasigroups and Related Systems
Formula-based specification of large quasigroups with the use of complete mappings over Abelian groups is investigated. Complete mappings specified by generalized feedback registers and generalized Feistel networks are considered. In both cases criteria for the mapping completeness are established.
Chakrabarti, S.   +4 more
openaire   +3 more sources

THE AVALANCHE EFFECT IN ENCRYPTION ALGORITHMS BASED ON THE DISCRETE CHAOTIC MAPS

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2019
The avalance effect has been investigated in an encryption algorithm being developed on the basis of the discrete chaotic maps. The avalanche effect has been analyzed in a discrete tent map and in the basic transformation based on the Feistel network ...
K. S. Mulyarchik
doaj  

Home - About - Disclaimer - Privacy