Results 131 to 140 of about 51,764 (172)
Some of the next articles are maybe not open access.

Ciphertext-only fault analysis on the Midori lightweight cryptosystem

Science China Information Sciences, 2020
Wei Li   +9 more
semanticscholar   +2 more sources

Explicit Upper Bound Of Impossible Differentials For AES-Like Ciphers: Application To uBlock And Midori

Computer/law journal, 2023
Whether a block cipher can resist impossible differential attack is an important basis to evaluate the security of a block cipher. However, the length of impossible differentials is important for the security evaluation of block ciphers.
Li Zhang   +4 more
semanticscholar   +1 more source

Quantum resource estimation of PRINCE and Midori Block Ciphers

International Journal of Information Technology
Ausaf Hussain Akhlaq   +2 more
semanticscholar   +2 more sources

New Automatic Search Method for Truncated-Differential Characteristics Application to Midori, SKINNY and CRAFT

Computer/law journal, 2020
In this paper, using Mixed-Integer Linear Programming, a new automatic search tool for truncated differential characteristic is presented. Our method models the problem of finding a maximal probability truncated differential characteristic, being able ...
A. E. Moghaddam, Z. Ahmadian
semanticscholar   +1 more source

GMPLS-enabled energy-efficient self-organized network: MiDORi

SPIE Proceedings, 2011
A network using minimum set of nodes and links that all communication data traffics among nodes can be carried while meeting the QoS requirements named MiDORi (Multi- (layer, path, and resources) Dynamically Optimized Routing) has been proposed. MiDORi network technologies that is composed of a low energy consumption network design tool (MiDORi path ...
Satoru Okamoto   +4 more
openaire   +1 more source

ADEOS-II (Midori-II) data system

IGARSS 2003. 2003 IEEE International Geoscience and Remote Sensing Symposium. Proceedings (IEEE Cat. No.03CH37477), 2004
ADEOS-II (Midori-II) was launched on December 14, 2002 by NASDA. Midori-II completed her 4-months initial checkout operation and is now in the calibration/validation phase. In this paper, Midori-II science data flow especially for NASDA core sensors (GLI and AMSR) is summarized.
T. Takeshima   +5 more
openaire   +1 more source

Unbalanced biclique cryptanalysis of a full round Midori

IET Communications, 2019
Midori is a family of lightweight block ciphers presented by Banik et al . at Asiacrypt 2015. Biclique cryptanalysis is a typical key-recovery attack that is proposed to attack the full AES by Bogdanov et al . in ASIACRYPT 2011.
Guoyong Han   +4 more
semanticscholar   +1 more source

Characterization of outer arm dynein in sea anemone,Anthopleura midori

Cell Motility and the Cytoskeleton, 1999
Outer arm dynein was purified from sperm flagella of a sea anemone, Anthopleura midori, and its biochemical and biophysical properties were characterized. The dynein, obtained at a 20S ATPase peak by sucrose density gradient centrifugation, consisted of two heavy chains, three intermediate chains, and seven light chains. The specific ATPase activity of
H, Mohri   +4 more
openaire   +2 more sources

Biclique cryptanalysis on Midori block cipher

International Journal of Embedded Systems, 2019
Biclique cryptanalysis is a typical key-recovery attack can significantly decrease computation and data complexity by utilising the main idea of meet-in-the-middle attack and the principle of biclique structure.
Hongluan Zhao, Guoyong Han
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy