Results 31 to 40 of about 1,483,203 (289)
Image Encryption Using Elliptic Curves and Rossby/Drift Wave Triads
We propose an image encryption scheme based on quasi-resonant Rossby/drift wave triads (related to elliptic surfaces) and Mordell elliptic curves (MECs).
Bustamante, Miguel D. +2 more
core +1 more source
In the modern block cipher, the substitution box (S-box) is a nonlinear constituent that plays a substantial role to create the confusion in ciphertext. S-boxes with low value of differential uniformity and high value of nonlinearity are considered more ...
Abid Mahboob +6 more
doaj +1 more source
A Novel Algorithm of Constructing Highly Nonlinear S-p-boxes
The role of substitution boxes is very important in block ciphers. Substitution boxes are utilized to create confusion in the cryptosystem. However, to create both confusion and diffusion in any cryptosystem p-boxes and chaos base substitution boxes are ...
Yasir Naseer +3 more
doaj +1 more source
A Matrix PRNG with S-Box Output Filtering [PDF]
We describe a modification to a previously published pseudorandom number generator improving security while maintaining high performance. The proposed generator is based on the powers of a word-packed block upper triangular matrix and it is designed to ...
Alvarez, Rafael, Zamora, Antonio
core +3 more sources
Biocidal Amidic Natural Products
Some of the more potent, and interesting, natural products that have marked biocidal properties have one, or more, amide functional groups. On the other hand, there are countless amides that are non-toxic.
Vernon G. S. Box
doaj +1 more source
Boomerang Connectivity Table:A New Cryptanalysis Tool [PDF]
A boomerang attack is a cryptanalysis framework that regards a block cipher $E$ as the composition of two sub-ciphers $E_1\circ E_0$ and builds a particular characteristic for $E$ with probability $p^2q^2$ by combining differential characteristics for ...
A Biryukov +21 more
core +2 more sources
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Carlet, Claude, Ding, Cunsheng
openaire +3 more sources
Boomerang uniformity of popular S-box constructions [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Shizhu Tian +2 more
openaire +5 more sources
An Improved AES Cryptosystem Based Genetic Method on S-Box, With, 256 Key Sizes and 14-Rounds [PDF]
Cryptography methods are widely use in digital communication for secure data transaction. Cryptography methods have two categories symmetric and asymmetric. Both types of encrypting have their own importance and limitations.
Lilhore, U. K. (Umesh) +1 more
core +1 more source
A New Chaotic S-Box Generation Method Using Parameter Optimization of One Dimensional Chaotic Maps
Chaotic systems have been used to generate the substitutional box structures. The existence of endless possibilities for the selection of the initial conditions and control parameters of the chaotic system has made it a necessity to use the optimization ...
Erkan Tanyildizi, Fatih Ozkaynak
doaj +1 more source

