Results 31 to 40 of about 6,661,504 (214)

Bit‐level evaluation of piccolo block cipher by satisfiability problem solver

open access: yesIET Information Security, Volume 17, Issue 4, Page 616-625, July 2023., 2023
The authors conducted bit‐level evaluations of the Piccolo block cipher against differential, integral, and impossible differential attacks using SAT‐based approaches. Authors’ work successfully identified the optimal differential distinguisher against differential and related‐key differential attacks.
Shion Utsumi   +2 more
wiley   +1 more source

Agonistic behavior of captive saltwater crocodile, crocodylus porosus in Kota Tinggi, Johor [PDF]

open access: yes, 2021
Agonistic behavior in Crocodylus porosus is well known in the wild, but the available data regarding this behavior among the captive individuals especially in a farm setting is rather limited. Studying the aggressive behavior of C.
Abdul-Latiff, Muhammad Abu Bakar   +6 more
core   +1 more source

Design and cryptanalysis of a new iterative structure

open access: yesIET Information Security, Volume 17, Issue 3, Page 335-346, May 2023., 2023
We propose a new iterative structure called the L‐Feistel structure, which has a similar encryption with decryption. The L‐Feistel structure not only provides a unified view of the Feistel structure and the Lai–Massey structure but also enlarges the choices of structures for block cipher designs.
Jiajie Liu, Bing Sun, Chao Li
wiley   +1 more source

Dynamic Selection of Symmetric Key Cryptographic Algorithms for Securing Data Based on Various Parameters [PDF]

open access: yes, 2014
Most of the information is in the form of electronic data. A lot of electronic data exchanged takes place through computer applications. Therefore information exchange through these applications needs to be secure.
Abraham, Jibi   +7 more
core   +1 more source

On Generalized Feistel Networks [PDF]

open access: yes, 2010
We prove beyond-birthday-bound security for most of the well-known types of generalized Feistel networks: (1) unbalanced Feistel networks, where the n-bit to m-bit round functions may have n ≠ m; (2) alternating Feistel networks, where the round functions alternate between contracting and expanding; (3) type-1, type-2, and type-3 Feistel networks ...
Viet Tung Hoang, Phillip Rogaway
openaire   +1 more source

KLEIN: A New Family of Lightweight Block Ciphers [PDF]

open access: yes, 2010
Resource-efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes.
A. Bogdanov   +39 more
core   +6 more sources

Developments in generalised Feistel networks

open access: yesElectronics Letters, 1999
Nyberg (1996) obtained an upper bound on the maximum average of differential probability for a generalised Feistel network. A counter-example to this result is given.
null Chee   +3 more
openaire   +1 more source

A New Cipher Based on Feistel Structure and Chaotic Maps

open access: yesمجلة بغداد للعلوم, 2019
Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed ...
Al-Bahrani et al.
doaj   +1 more source

Elastic Block Ciphers: Method, Security and Instantiations [PDF]

open access: yes, 2009
We introduce the concept of an elastic block cipher which refers to stretching the supported block size of a block cipher to any length up to twice the original block size while incurring a computational workload that is proportional to the block size ...
Cook, Debra L.   +2 more
core   +3 more sources

Proposed 256 bits RC5 Encryption Algorithm Using Type-3 Feistel Network [PDF]

open access: yesEngineering and Technology Journal, 2010
Proposed 256 bits RC5 is an improvement to RC5, designed to meetthe requirements of increased security and better performance. Proposed256 bits RC5 algorithm makes use of data dependent rotations.
Yossra H. Ali
doaj   +1 more source

Home - About - Disclaimer - Privacy