Results 131 to 140 of about 9,453 (199)

Application of a MEMS-Based TRNG in a Chaotic Stream Cipher. [PDF]

open access: yesSensors (Basel), 2017
Garcia-Bosque M   +3 more
europepmc   +1 more source

Impossible Differential Cryptanalysis of SPECK

Communications in Computer and Information Science, 2019
The security of SPECK under impossible differential cryptanalysis is studied. Based on multiple 6-round impossible differential distinguishers and combined with the divide-and-conquer attack and time-and-memory tradeoff, the improved 10-round impossible differential cryptanalysis of SPECK32/64 and SPECK48/96 is presented by adding one round forward and
Linhong Xu   +3 more
openaire   +3 more sources

IMPOSSIBLE DIFFERENTIAL CRYPTANALYSIS OF MINI-AES

open access: closedCryptologia, 2003
Impossible differential cryptanalysis is one of the cryptanalysis methods that are applicable to the new Advanced Encryption Standard (AES). In this paper, we present an introduction to the method by applying it on Mini-AES, the mini version of the AES published in Cryptologia recently.
Raphaël C.‐W. Phan
openalex   +4 more sources

Home - About - Disclaimer - Privacy