Results 131 to 140 of about 9,453 (199)
Application of a MEMS-Based TRNG in a Chaotic Stream Cipher. [PDF]
Garcia-Bosque M +3 more
europepmc +1 more source
Quantum Implementation of the SAND Algorithm and Its Quantum Resource Estimation for Brute-Force Attack. [PDF]
Wu H, Feng X, Zhang J.
europepmc +1 more source
An Image Encryption Algorithm Based on Time-Delay and Random Insertion. [PDF]
Huang X, Ye G.
europepmc +1 more source
Quantum Computing in the Next-Generation Computational Biology Landscape: From Protein Folding to Molecular Dynamics. [PDF]
Pal S +3 more
europepmc +1 more source
Ensemble of Chaotic and Naive Approaches for Performance Enhancement in Video Encryption. [PDF]
Chandrasekaran J, Thiruvengadam SJ.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Impossible Differential Cryptanalysis of SPECK
Communications in Computer and Information Science, 2019The security of SPECK under impossible differential cryptanalysis is studied. Based on multiple 6-round impossible differential distinguishers and combined with the divide-and-conquer attack and time-and-memory tradeoff, the improved 10-round impossible differential cryptanalysis of SPECK32/64 and SPECK48/96 is presented by adding one round forward and
Linhong Xu +3 more
openaire +3 more sources
IMPOSSIBLE DIFFERENTIAL CRYPTANALYSIS OF MINI-AES
Impossible differential cryptanalysis is one of the cryptanalysis methods that are applicable to the new Advanced Encryption Standard (AES). In this paper, we present an introduction to the method by applying it on Mini-AES, the mini version of the AES published in Cryptologia recently.
Raphaël C.‐W. Phan
openalex +4 more sources

