Analisis Perbandingan antara Algoritma Rijndael dan Algoritma Twofish dalam Penyandian Teks [PDF]
Kemudahan pengaksesan media komunikasi dengan memanfaatkan kemajuan teknologi informasi tentunya akan memberikan dampak bagi keamanan informasi atau pesan yang menggunakan media komunikasi tersebut.
Shulhan, I. (Izzat)
core +2 more sources
Cellular Neural Network Encryption Scheme for Time Synchronization and CPAs Resistance in OFDM-PON
In this paper, we first experimentally demonstrate a novel cellular neural network (CNN)-based physical layer encryption scheme to achieve the capability of chosen-plaintext attacks (CPAs) resistance and time synchronization simultaneously in orthogonal ...
Meihua Bi +4 more
doaj +1 more source
Integral and impossible‐differential attacks on the reduced‐round Lesamnta‐LW‐BC
Lesamnta‐LW‐BC is the internal block cipher of the Lesamnta‐LW lightweight hash function, specified in ISO/IEC 29192‐5:2016. It is based on the unbalanced Feistel network and Advanced Encryption Standard round function.
Rentaro Shiba +4 more
doaj +1 more source
A General Analysis of the Security of Elastic Block Ciphers [PDF]
We analyze the security of elastic block ciphers in general to show that an attack on an elastic version of block cipher implies a polynomial time related attack on the fixed-length version of the block cipher.
Cook, Debra L. +2 more
core +2 more sources
FPGA implementation of a chaos-based image encryption algorithm
With the rapid development of communication networks and the establishment of 5G networks, there is a growing demand for the transmission of images and videos with different sizes and formats.
Mohamed Maazouz +4 more
doaj +1 more source
Quantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networks
37 ...
S. Hodžić, A. Roy, E. Andreeva
openaire +2 more sources
Fast and slow domino regimes in transient network dynamics [PDF]
It is well known that the addition of noise to a multistable dynamical system can induce random transitions from one stable state to another. For low noise, the times between transitions have an exponential tail and Kramers' formula gives an expression ...
Ashwin, Peter +2 more
core +2 more sources
FPGA Simulation of Type-3 Feistel Network of The 128 bits Block Size Improved Blowfish Cryptographic Encryption [PDF]
Reprogrammable devices such as Field Programmable Gate Arrays (FPGAs)are highly attractive options for hardware implementations of encryption algorithmsas they provide cryptographic algorithm agility, physical security, and potentiallymuch higher ...
Ashwaq Talib Hashim +2 more
doaj +1 more source
Integral Cryptanalysis of WARP based on Monomial Prediction
WARP is a 128-bit block cipher published by Banik et al. at SAC 2020 as a lightweight alternative to AES. It is based on a generalized Feistel network and achieves the smallest area footprint among 128-bit block ciphers in many settings.
Hosein Hadipour, Maria Eichlseder
doaj +1 more source
Sequential escapes: onset of slow domino regime via a saddle connection [PDF]
We explore sequential escape behaviour of coupled bistable systems under the influence of stochastic perturbations. We consider transient escapes from a marginally stable "quiescent" equilibrium to a more stable "active" equilibrium.
Ashwin, Peter +2 more
core +2 more sources

