Results 101 to 110 of about 3,190 (199)
A new distinguishing attack on reduced round ChaCha permutation. [PDF]
Dey C, Sarkar S.
europepmc +1 more source
The impossible differential (ID) attack is one of the most important cryptanalytic techniques for block ciphers. There are two phases to finding an ID attack: searching for the distinguisher and building a key recovery upon it.
Debasmita Chakraborty +3 more
doaj +1 more source
Deep-Learning-Based Cryptanalysis of Lightweight Block Ciphers Revisited. [PDF]
Kim H +6 more
europepmc +1 more source
Cryptanalysis of an Image Encryption Algorithm Based on a 2D Hyperchaotic Map. [PDF]
Zhang C, Chen J, Chen D.
europepmc +1 more source
Quantum Neural Network Based Distinguisher on SPECK-32/64. [PDF]
Kim H +5 more
europepmc +1 more source
Efficient Attack Scheme against SKINNY-64 Based on Algebraic Fault Analysis. [PDF]
Fang X, Zhang H, Cui X, Wang Y, Ding L.
europepmc +1 more source
Year 2010 Issues on Cryptographic Algorithms [PDF]
In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions.
Masashi Une, Masayuki Kanda
core
A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map. [PDF]
Ali A, Khan MA, Ayyasamy RK, Wasif M.
europepmc +1 more source
The Odyssey of Entropy: Cryptography. [PDF]
Zolfaghari B, Bibak K, Koshiba T.
europepmc +1 more source

