Results 151 to 160 of about 3,178 (206)
A Secure and Fast Image Encryption Scheme Based on Double Chaotic S-Boxes. [PDF]
Zhu S, Wang G, Zhu C.
europepmc +1 more source
Application of a MEMS-Based TRNG in a Chaotic Stream Cipher. [PDF]
Garcia-Bosque M +3 more
europepmc +1 more source
Quantum Implementation of the SAND Algorithm and Its Quantum Resource Estimation for Brute-Force Attack. [PDF]
Wu H, Feng X, Zhang J.
europepmc +1 more source
Quantum Computing in the Next-Generation Computational Biology Landscape: From Protein Folding to Molecular Dynamics. [PDF]
Pal S +3 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Impossible Differential Cryptanalysis
2023International ...
Boura, Christina, Naya-Plasencia, María
openaire +2 more sources
Impossible differential cryptanalysis of Advanced Encryption Standard
Science in China Series F: Information Sciences, 2007zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Chen, Jie, Hu, Yupu, Zhang, Yueyu
openaire +2 more sources
Improved Impossible Differential Cryptanalysis of ARIA
2008 International Conference on Information Security and Assurance (isa 2008), 2008Impossible differential cryptanalysis is a method recovering secret key by getting rid of the keys that satisfy impossible differential relations. This cryptanalysis has been used to attack AES and many good results were gotten. For the new block cipher ARIA is similar to AES in structure, it is necessary to research its security against impossible ...
Shenhua Li, Chunyan Song
openaire +1 more source
Impossible Differential-Algebraic Cryptanalysis of Serpent
2009 International Conference on Multimedia Information Networking and Security, 2009Serpent is an SP Network block cipher submitted to the AES competition and chosen as one of its five finalists. The security of Serpent is widely acknowledged, especially as the best known attack so far is a differential-linear attack on only 11 rounds out of the 32 rounds of the cipher.
Zhihua Hu, Zhongping Qin, Haiqing Han
openaire +1 more source
Impossible Differential Cryptanalysis of SNAKE-2
2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, 20099-round impossible differentials of SNAKE-2 are found due to the simple linear transformation in its round function, and 10 to 12-round SNAKE-2 are attacked by using these impossible differentials .
Bing Sun, Longjiang Qu, Chao Li
openaire +1 more source

