Results 41 to 50 of about 3,178 (206)

Impossible 4-Tuple Attack: A New Mixture-Based Cryptanalysis Applied to Reduced-Round AES-128

open access: yesIEEE Access
Mixture differential cryptanalysis is a powerful technique for evaluating the robustness of Substitution-Permutation Network (SPN)-structured block ciphers, including the Advanced Encryption Standard (AES).
Masroor Hajari   +4 more
doaj   +1 more source

The Impossible Differential Cryptanalysis [PDF]

open access: yes, 2017
V našej diplomovej práci sme sa venovali kryptoanalýze pomocou nemožných diferenciálov ako mierke na testovanie slabín šifier. Kvôli relatívnej novosti, oproti lineárnej a diferenciálnej analýze, nie je táto analýza veľmi známa a existuje len málo ...
Poljak Peter
core  

Quantum differential cryptanalysis to the block ciphers

open access: yes, 2015
Differential cryptanalysis is one of the most popular methods in attacking block ciphers. However, there still some limitations in traditional differential cryptanalysis.
Li, Hong-Wei, Yang, Li
core   +1 more source

Enhancing E‐Commerce Security Based on Involution Function Using Twin Key AES Cipher

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
In the realm of surging e‐commerce data and increasing digital transactions, ensuring end‐to‐end security is paramount to protect sensitive information and maintain user trust. The Advanced Encryption Standard (AES), a cornerstone of network security, relies on symmetric key encryption for secure communication.
Biresh Kumar   +11 more
wiley   +1 more source

A Better Key Schedule for DES-like Ciphers [PDF]

open access: yes, 1996
Several DES-like ciphers aren't utilizing their full potential strength, because of the short key and linear or otherwise easily tractable algorithms they use to generate their key schedules.
Bellovin, Steven Michael   +1 more
core   +3 more sources

Improvement of the Minimal‐Guess‐Basis MILP Model and Its Application to ESF

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
The guess‐and‐determine technique find wide applications in the recovery of unknown variables within given system of relations. The fundamental concept behind this technique involves guessing certain unknown variables and deducing the remaining ones based on the relational system.
Lingchen Li   +5 more
wiley   +1 more source

Software system of cryptanalysis using impossible differentials method based on parallel programming technologies OpenMP and MPI [PDF]

open access: yes, 2013
Програма, яка розробляється в даному проекті, призначена для проведення криптоаналізу методом неможливих диференціалів блокового симетричного шифру AES, а саме – над елементами раунду.The program is being developed in this project is designed for ...
Novak, Nazarii   +1 more
core  

Further Results of the Cryptographic Properties on the Butterfly Structures

open access: yes, 2016
Recently, a new structure called butterfly introduced by Perrin et at. is attractive for that it has very good cryptographic properties: the differential uniformity is at most equal to 4 and algebraic degree is also very high when exponent $e=3$.
Feng, Xiutao, Fu, Shihui
core   +1 more source

Extended Generalized Feistel Networks using Matrix Representation [PDF]

open access: yes, 2013
International audienceWhile Generalized Feistel Networks have been widely studied in the literature as a building block of a block cipher, we propose in this paper a unified vision to easily represent them through a matrix representation. We then propose
A Biryukov   +23 more
core   +3 more sources

Quantum‐Resistant Security in Digital Twin Healthcare Systems

open access: yesIET Wireless Sensor Systems, Volume 16, Issue 1, January/December 2026.
Quantum‐safe architecture for secure healthcare data transmission integrating QKD, edge devices, and cloud‐based Digital Twin analytics. ABSTRACT The development of digital twin (DT) systems for healthcare presents several challenges, particularly in ensuring data protection and communication security in real‐time environments.
Ahmed K. Jameil, Hamed Al‐Raweshidy
wiley   +1 more source

Home - About - Disclaimer - Privacy