Results 11 to 20 of about 343 (81)
Practical Key-Recovery Attacks On Round-Reduced Ketje Jr, Xoodoo-AE And Xoodyak
AbstractA new conditional cube attack was proposed by Li et al. at ToSC 2019 for cryptanalysis of Keccak keyed modes. In this paper, we find a new property of Li et al.’s method. The conditional cube attack is modified and applied to cryptanalysis of 5-round Ketje Jr, 6-round Xoodoo-AE and Xoodyak, where Ketje Jr is among the third round CAESAR ...
Haibo Zhou +4 more
semanticscholar +3 more sources
The objective of this study is to examine the influence of ethical sales behavior, brand equity, and customer experience on customer loyalty at Ketje Coffee in Bandar Lampung. The research population consists of customers of Ketje Coffee in Bandar Lampung, with a sample size of 100 customers.
Nia Aprilia +1 more
semanticscholar +4 more sources
Improved State-Recovery Attacks on Modified KETJE JR
Guo-Shuang Zhang +52 more
semanticscholar +3 more sources
Penelitian ini bertujuan untuk mengoptimalkan kepuasan pelanggan di Café Kopi Ketje, Kota Jambi, dengan mengulas dan mengevaluasi pengaruh harga, kualitas pelayanan, dan kualitas produk. Metode eksploratif yang diterapkan mengandalkan pendekatan kuantitatif, dengan 100 responden yang dipilih sebagai sampel.
Muhammad Haris Saputra +5 more
semanticscholar +4 more sources
New Results on Modified Versions of Ketje Jr [PDF]
This report documents the program and the outcomes of Dagstuhl Seminar 18021 "Symmetric Cryptography", which was held on January 7-12, 2018 in Schloss Dagstuhl-Leibniz Center for Informatics. The seminar was the sixth in a series of Dagstuhl seminars on "Symmetric Cryptography", previously held ...
Naya-Plasencia, María +2 more
core +6 more sources
Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP
Cube-attack-like cryptanalysis on round-reduced Keccak was proposed by Dinur et al. at EUROCRYPT 2015. It recovers the key through two phases: the preprocessing phase for precomputing a look-up table and online phase for querying the output and getting ...
Ling Song, Jian Guo
doaj +2 more sources
Authenticated ciphers, which combine the cryptographic services of confidentiality, integrity, and authentication into one algorithmic construct, can potentially provide improved security and efficiencies in the processing of sensitive data.
William Diehl +4 more
doaj +2 more sources
Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems [PDF]
The deployment of security services over Wireless Sensor Networks (WSN) and IoT devices brings significant processing and energy consumption overheads. These overheads are mainly determined by algorithmic efficiency, quality of implementation, and operating system.
Geovandro C. C. F. Pereira +6 more
wiley +4 more sources
New Conditional Cube Attack on Keccak Keyed Modes
The conditional cube attack on round-reduced Keccak keyed modes was proposed by Huang et al. at EUROCRYPT 2017. In their attack, a conditional cube variable was introduced, whose diffusion was significantly reduced by certain key bit conditions.
Zheng Li +5 more
doaj +2 more sources
ANALISIS FAKTOR-FAKTOR YANG MEMPENGARUHI MINAT BELI PADA KOPI KETJE PANJANG
This research aims to determine and analyze the factors that influence consumer interest in Ketje Panjang Coffee. Population is the sum of all possible values, calculated and measured, so that the population of this study are consumers of Ketje Panjang Coffee.
Dinda Mareta, Herry Goenawan Soedarsa
openaire +3 more sources

