Results 51 to 60 of about 6,728,968 (223)

Analisis Perbandingan antara Algoritma Rijndael dan Algoritma Twofish dalam Penyandian Teks [PDF]

open access: yes, 2018
Kemudahan pengaksesan media komunikasi dengan memanfaatkan kemajuan teknologi informasi tentunya akan memberikan dampak bagi keamanan informasi atau pesan yang menggunakan media komunikasi tersebut.
Shulhan, I. (Izzat)
core   +2 more sources

Cellular Neural Network Encryption Scheme for Time Synchronization and CPAs Resistance in OFDM-PON

open access: yesIEEE Access, 2019
In this paper, we first experimentally demonstrate a novel cellular neural network (CNN)-based physical layer encryption scheme to achieve the capability of chosen-plaintext attacks (CPAs) resistance and time synchronization simultaneously in orthogonal ...
Meihua Bi   +4 more
doaj   +1 more source

Integral and impossible‐differential attacks on the reduced‐round Lesamnta‐LW‐BC

open access: yesIET Information Security, 2022
Lesamnta‐LW‐BC is the internal block cipher of the Lesamnta‐LW lightweight hash function, specified in ISO/IEC 29192‐5:2016. It is based on the unbalanced Feistel network and Advanced Encryption Standard round function.
Rentaro Shiba   +4 more
doaj   +1 more source

A General Analysis of the Security of Elastic Block Ciphers [PDF]

open access: yes, 2005
We analyze the security of elastic block ciphers in general to show that an attack on an elastic version of block cipher implies a polynomial time related attack on the fixed-length version of the block cipher.
Cook, Debra L.   +2 more
core   +2 more sources

FPGA implementation of a chaos-based image encryption algorithm

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
With the rapid development of communication networks and the establishment of 5G networks, there is a growing demand for the transmission of images and videos with different sizes and formats.
Mohamed Maazouz   +4 more
doaj   +1 more source

Quantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networks

open access: yesDesigns, Codes and Cryptography, 2023
37 ...
S. Hodžić, A. Roy, E. Andreeva
openaire   +2 more sources

Fast and slow domino regimes in transient network dynamics [PDF]

open access: yes, 2017
It is well known that the addition of noise to a multistable dynamical system can induce random transitions from one stable state to another. For low noise, the times between transitions have an exponential tail and Kramers' formula gives an expression ...
Ashwin, Peter   +2 more
core   +2 more sources

FPGA Simulation of Type-3 Feistel Network of The 128 bits Block Size Improved Blowfish Cryptographic Encryption [PDF]

open access: yesEngineering and Technology Journal, 2010
Reprogrammable devices such as Field Programmable Gate Arrays (FPGAs)are highly attractive options for hardware implementations of encryption algorithmsas they provide cryptographic algorithm agility, physical security, and potentiallymuch higher ...
Ashwaq Talib Hashim   +2 more
doaj   +1 more source

Integral Cryptanalysis of WARP based on Monomial Prediction

open access: yesIACR Transactions on Symmetric Cryptology, 2022
WARP is a 128-bit block cipher published by Banik et al. at SAC 2020 as a lightweight alternative to AES. It is based on a generalized Feistel network and achieves the smallest area footprint among 128-bit block ciphers in many settings.
Hosein Hadipour, Maria Eichlseder
doaj   +1 more source

Sequential escapes: onset of slow domino regime via a saddle connection [PDF]

open access: yes, 2018
We explore sequential escape behaviour of coupled bistable systems under the influence of stochastic perturbations. We consider transient escapes from a marginally stable "quiescent" equilibrium to a more stable "active" equilibrium.
Ashwin, Peter   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy