Results 31 to 40 of about 6,661,504 (214)
Bit‐level evaluation of piccolo block cipher by satisfiability problem solver
The authors conducted bit‐level evaluations of the Piccolo block cipher against differential, integral, and impossible differential attacks using SAT‐based approaches. Authors’ work successfully identified the optimal differential distinguisher against differential and related‐key differential attacks.
Shion Utsumi +2 more
wiley +1 more source
Agonistic behavior of captive saltwater crocodile, crocodylus porosus in Kota Tinggi, Johor [PDF]
Agonistic behavior in Crocodylus porosus is well known in the wild, but the available data regarding this behavior among the captive individuals especially in a farm setting is rather limited. Studying the aggressive behavior of C.
Abdul-Latiff, Muhammad Abu Bakar +6 more
core +1 more source
Design and cryptanalysis of a new iterative structure
We propose a new iterative structure called the L‐Feistel structure, which has a similar encryption with decryption. The L‐Feistel structure not only provides a unified view of the Feistel structure and the Lai–Massey structure but also enlarges the choices of structures for block cipher designs.
Jiajie Liu, Bing Sun, Chao Li
wiley +1 more source
Dynamic Selection of Symmetric Key Cryptographic Algorithms for Securing Data Based on Various Parameters [PDF]
Most of the information is in the form of electronic data. A lot of electronic data exchanged takes place through computer applications. Therefore information exchange through these applications needs to be secure.
Abraham, Jibi +7 more
core +1 more source
On Generalized Feistel Networks [PDF]
We prove beyond-birthday-bound security for most of the well-known types of generalized Feistel networks: (1) unbalanced Feistel networks, where the n-bit to m-bit round functions may have n ≠ m; (2) alternating Feistel networks, where the round functions alternate between contracting and expanding; (3) type-1, type-2, and type-3 Feistel networks ...
Viet Tung Hoang, Phillip Rogaway
openaire +1 more source
KLEIN: A New Family of Lightweight Block Ciphers [PDF]
Resource-efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes.
A. Bogdanov +39 more
core +6 more sources
Developments in generalised Feistel networks
Nyberg (1996) obtained an upper bound on the maximum average of differential probability for a generalised Feistel network. A counter-example to this result is given.
null Chee +3 more
openaire +1 more source
A New Cipher Based on Feistel Structure and Chaotic Maps
Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed ...
Al-Bahrani et al.
doaj +1 more source
Elastic Block Ciphers: Method, Security and Instantiations [PDF]
We introduce the concept of an elastic block cipher which refers to stretching the supported block size of a block cipher to any length up to twice the original block size while incurring a computational workload that is proportional to the block size ...
Cook, Debra L. +2 more
core +3 more sources
Proposed 256 bits RC5 Encryption Algorithm Using Type-3 Feistel Network [PDF]
Proposed 256 bits RC5 is an improvement to RC5, designed to meetthe requirements of increased security and better performance. Proposed256 bits RC5 algorithm makes use of data dependent rotations.
Yossra H. Ali
doaj +1 more source

