Results 41 to 50 of about 1,483,203 (289)
NONLINEAR NYBERG CONSTRUCTION TRANSFORMS OVER ISOMORPHIC REPRESENTATIONS OF FIELDS GALOIS
Further development of cryptographic algorithms based on the principles of many-valued logic requires more accurate research of non-binary cryptographic primitives – S-boxes.
A. V. Sokolov, O. N. Zhdanov
doaj +1 more source
In the new era of cryptography, Substitution Boxes (S-Boxes) are very important to raise confusion in cipher text and the security of encryption directly depends on the algebraic strength of S-box.
Abid Mahboob +5 more
doaj +1 more source
ABSTRACT Background An international Delphi panel of experts developed consensus statements to delineate the circumstances where the risks of dexamethasone as an antiemetic do and do not outweigh its benefits. Procedure Experts in supportive care of pediatric patients were invited to participate.
Negar Shavandi +20 more
wiley +1 more source
A New Image Encryption Algorithm Based on Single S-Box and Dynamic Encryption Step
Chaotic-based S-box image encryption schemes promise to be a practical solution for securing digital images. However, the high-dimensional continuous chaotic has increased the algorithm’s complexity.
Wang Ji Jun, Tan Soo Fun
doaj +1 more source
Актуальность. S-блоки являются одним из основных преобразований многих шифров, и поиску S-блоков с улучшенными криптографическими показателями уделяется громадное внимание в литературе этого направления. Тем самым полагается, что есть подстановки (S-блоки), которые следует считать плохими, т.е. такие, которые не подходят для построения надежных шифров.
openaire +3 more sources
New directions in cryptanalysis of block ciphers. [PDF]
The algebraic expression of the Advanced Encryption Standard (AES) RIJNDAEL S-box involved only 9 terms. The selected mapping for RIJNDAEL S-box has a simple algebraic expression.
Md Said, Mohamad Rushdan +1 more
core
Quantum differential cryptanalysis to the block ciphers
Differential cryptanalysis is one of the most popular methods in attacking block ciphers. However, there still some limitations in traditional differential cryptanalysis.
Li, Hong-Wei, Yang, Li
core +1 more source
A Study on the Linear Cryptanalysis of AES Cipher [PDF]
We have investigated the linear cryptanalysis of AES cipher in this article. As the previous encryption standard DES could be broken by the linear cryptanalysis, NIST decided a new encryption standard AES in 2000. We try to analyze one and two rounds AES
Dong, Wang Xiao +2 more
core +1 more source
ABSTRACT Objective To evaluate selumetinib exposure using therapeutic drug monitoring (TDM) in pediatric patients with neurofibromatosis type 1 (NF1) and plexiform neurofibromas (PN), assess interpatient pharmacokinetic variability, and explore the relationship between drug exposure, clinical response, and adverse effects.
Janka Kovács +8 more
wiley +1 more source
Side-Channel Analysis of Chaos-Based Substitution Box Structures
There is a theoretically strong relationship between chaos and cryptology. In practice, one of the most successful applications of this relationship is chaos-based s-box structures.
Mehmet Sahin Acikkapi +2 more
doaj +1 more source

