Results 21 to 30 of about 6,661,504 (214)

Throwing Boomerangs into Feistel Structures

open access: yesIACR Transactions on Symmetric Cryptology, 2022
Automatic tools to search for boomerang distinguishers have seen significant advances over the past few years. However, most previous work has focused on ciphers based on a Substitution Permutation Network (SPN), while analyzing the Feistel structure is
Hosein Hadipour   +2 more
doaj   +1 more source

A Modification of TEA Block Cipher Algorithm for Data Security (MTEA) [PDF]

open access: yesEngineering and Technology Journal, 2011
This paper attempts to develop a simple, stronger and safer cryptographic algorithm which would not only be a secure one, but also reduces total time taken for encryption and decryption.
Gaidaa Saeed Mahdi
doaj   +1 more source

Implementation and Evaluation of a Machine Learned Mesoscale Eddy Parameterization Into a Numerical Ocean Circulation Model

open access: yesJournal of Advances in Modeling Earth Systems, Volume 15, Issue 10, October 2023., 2023
Abstract We address the question of how to use a machine learned (ML) parameterization in a general circulation model (GCM), and assess its performance both computationally and physically. We take one particular ML parameterization (Guillaumin & Zanna, 2021, https://doi.org/10.1002/essoar.10506419.1) and evaluate the online performance in a different ...
Cheng Zhang   +5 more
wiley   +1 more source

Automatic Search of Rectangle Attacks on Feistel Ciphers: Application to WARP

open access: yesIACR Transactions on Symmetric Cryptology, 2022
In this paper we present a boomerang analysis of WARP, a recently proposed Generalized Feistel Network with extremely compact hardware implementations.
Virginie Lallemand   +2 more
doaj   +1 more source

Feistel Network Assisted Dynamic Keying based SPN Lightweight Encryption for IoT Security

open access: yes, 2021
In the last few years Internet-of-Things (IoT) technology has emerged significantly to serve varied purposes including healthcare, surveillance and control, business communication, civic administration and even varied financial activities.
K. Gurumanapalli, Nagendra Muthuluru
semanticscholar   +1 more source

Best Effort and Practice Activation Codes [PDF]

open access: yes, 2010
Activation Codes are used in many different digital services and known by many different names including voucher, e-coupon and discount code. In this paper we focus on a specific class of ACs that are short, human-readable, fixed-length and represent ...
Furnell, S.   +4 more
core   +4 more sources

Still minding the gap? Reflecting on transitions between concepts of information in varied domains [PDF]

open access: yes, 2020
This conceptual paper, a contribution to the tenth anniversary special issue of information, gives a cross-disciplinary review of general and unified theories of information.
Bawden, D., Robinson, L.
core   +1 more source

Integration of lightweight cryptography and watermarking with compression for high speed and reliable communication of digital images in IoT

open access: yesIET Image Processing, Volume 17, Issue 10, Page 2984-3001, 21 August 2023., 2023
In IoT sensors, which are used to record and send images, secure image transmission is of great importance. Therefore, we need to use encryption, watermarking and compression processes. Here, a new integrated method of lightweight encryption, watermarking and compression for the fast and secure transmission of images is proposed.
Hadi Nazari   +2 more
wiley   +1 more source

Wave-Shaped Round Functions and Primitive Groups [PDF]

open access: yes, 2018
Round functions used as building blocks for iterated block ciphers, both in the case of Substitution-Permutation Networks and Feistel Networks, are often obtained as the composition of different layers which provide confusion and diffusion, and key ...
Aragona, Riccardo   +4 more
core   +2 more sources

Differential analysis of the NBC algorithm based on mixed integer linear programming model

open access: yesSECURITY AND PRIVACY, Volume 6, Issue 4, July/August 2023., 2023
Abstract This paper mainly studies mixed integer linear programming (MILP)‐based cryptanalysis on round‐reduced NBC algorithm with generalized Feistel structure. First, each component of the algorithm is equivalently described by linear inequality equations, and the propagation rules of differential characteristics and linear approximation are ...
Lan Zhang, Bin Yu, Liangsheng He
wiley   +1 more source

Home - About - Disclaimer - Privacy