Results 21 to 30 of about 6,661,504 (214)
Throwing Boomerangs into Feistel Structures
Automatic tools to search for boomerang distinguishers have seen significant advances over the past few years. However, most previous work has focused on ciphers based on a Substitution Permutation Network (SPN), while analyzing the Feistel structure is
Hosein Hadipour +2 more
doaj +1 more source
A Modification of TEA Block Cipher Algorithm for Data Security (MTEA) [PDF]
This paper attempts to develop a simple, stronger and safer cryptographic algorithm which would not only be a secure one, but also reduces total time taken for encryption and decryption.
Gaidaa Saeed Mahdi
doaj +1 more source
Abstract We address the question of how to use a machine learned (ML) parameterization in a general circulation model (GCM), and assess its performance both computationally and physically. We take one particular ML parameterization (Guillaumin & Zanna, 2021, https://doi.org/10.1002/essoar.10506419.1) and evaluate the online performance in a different ...
Cheng Zhang +5 more
wiley +1 more source
Automatic Search of Rectangle Attacks on Feistel Ciphers: Application to WARP
In this paper we present a boomerang analysis of WARP, a recently proposed Generalized Feistel Network with extremely compact hardware implementations.
Virginie Lallemand +2 more
doaj +1 more source
Feistel Network Assisted Dynamic Keying based SPN Lightweight Encryption for IoT Security
In the last few years Internet-of-Things (IoT) technology has emerged significantly to serve varied purposes including healthcare, surveillance and control, business communication, civic administration and even varied financial activities.
K. Gurumanapalli, Nagendra Muthuluru
semanticscholar +1 more source
Best Effort and Practice Activation Codes [PDF]
Activation Codes are used in many different digital services and known by many different names including voucher, e-coupon and discount code. In this paper we focus on a specific class of ACs that are short, human-readable, fixed-length and represent ...
Furnell, S. +4 more
core +4 more sources
Still minding the gap? Reflecting on transitions between concepts of information in varied domains [PDF]
This conceptual paper, a contribution to the tenth anniversary special issue of information, gives a cross-disciplinary review of general and unified theories of information.
Bawden, D., Robinson, L.
core +1 more source
In IoT sensors, which are used to record and send images, secure image transmission is of great importance. Therefore, we need to use encryption, watermarking and compression processes. Here, a new integrated method of lightweight encryption, watermarking and compression for the fast and secure transmission of images is proposed.
Hadi Nazari +2 more
wiley +1 more source
Wave-Shaped Round Functions and Primitive Groups [PDF]
Round functions used as building blocks for iterated block ciphers, both in the case of Substitution-Permutation Networks and Feistel Networks, are often obtained as the composition of different layers which provide confusion and diffusion, and key ...
Aragona, Riccardo +4 more
core +2 more sources
Differential analysis of the NBC algorithm based on mixed integer linear programming model
Abstract This paper mainly studies mixed integer linear programming (MILP)‐based cryptanalysis on round‐reduced NBC algorithm with generalized Feistel structure. First, each component of the algorithm is equivalently described by linear inequality equations, and the propagation rules of differential characteristics and linear approximation are ...
Lan Zhang, Bin Yu, Liangsheng He
wiley +1 more source

