Results 101 to 110 of about 3,190 (199)

Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs

open access: yesIACR Transactions on Symmetric Cryptology
The impossible differential (ID) attack is one of the most important cryptanalytic techniques for block ciphers. There are two phases to finding an ID attack: searching for the distinguisher and building a key recovery upon it.
Debasmita Chakraborty   +3 more
doaj   +1 more source

Deep-Learning-Based Cryptanalysis of Lightweight Block Ciphers Revisited. [PDF]

open access: yesEntropy (Basel), 2023
Kim H   +6 more
europepmc   +1 more source

Quantum Neural Network Based Distinguisher on SPECK-32/64. [PDF]

open access: yesSensors (Basel), 2023
Kim H   +5 more
europepmc   +1 more source

Year 2010 Issues on Cryptographic Algorithms [PDF]

open access: yes
In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions.
Masashi Une, Masayuki Kanda
core  

Entropy in Image Analysis III. [PDF]

open access: yesEntropy (Basel), 2021
Sparavigna AC.
europepmc   +1 more source

The Odyssey of Entropy: Cryptography. [PDF]

open access: yesEntropy (Basel), 2022
Zolfaghari B, Bibak K, Koshiba T.
europepmc   +1 more source

Home - About - Disclaimer - Privacy