Results 41 to 50 of about 435,325 (313)

Construction of Robust Lightweight S-Boxes Using Enhanced Logistic and Enhanced Sine Maps

open access: yesIEEE Access
Substitution boxes (S-Boxes) are essential elements of modern block ciphers, serving as non-linear characteristics that enhance the resistance of these ciphers against cryptanalysis.
Phuc-Phan Duong   +6 more
doaj   +1 more source

Стойкость ГОСТ 28147-89 при использовании таблицы подстановок из ГОСТ 34.311-95 [PDF]

open access: yes, 2001
Розглядається стійкість ГОСТ 28147-89 при використанні довгострокового ключа, що наведений у стандарті хешування ГОСТ 34.311-95. Наводяться приклади побудови диференційних характеристик та доводиться неможливість диференційної та лінійної атаки на ГОСТ ...
Олейников, Роман
core  

By dawn or dusk—how circadian timing rewrites bacterial infection outcomes

open access: yesFEBS Letters, EarlyView.
The circadian clock shapes immune function, yet its influence on infection outcomes is only beginning to be understood. This review highlights how circadian timing alters host responses to the bacterial pathogens Salmonella enterica, Listeria monocytogenes, and Streptococcus pneumoniae revealing that the effectiveness of immune defense depends not only
Devons Mo   +2 more
wiley   +1 more source

Method to Improve the Cryptographic Properties of S-Boxes

open access: yesIEEE Access, 2023
This study presents a method based on elementary logic and arithmetic operations to enhance the cryptographic properties of Substitution Boxes (S-Boxes).
Jesus Agustin Aboytes-Gonzalez   +4 more
doaj   +1 more source

DEGENERATE S-BOXES

open access: yesRadio Electronics, Computer Science, Control, 2018
Актуальность. S-блоки являются одним из основных преобразований многих шифров, и поиску S-блоков с улучшенными криптографическими показателями уделяется громадное внимание в литературе этого направления. Тем самым полагается, что есть подстановки (S-блоки), которые следует считать плохими, т.е. такие, которые не подходят для построения надежных шифров.
openaire   +3 more sources

Extended Analysis of DES S-boxes [PDF]

open access: yes, 2013
For more than three decades, the Data Encryption Standard (DES) was one the most widely used cryptographic algorithms. It is still the dominating block cipher for banking applications.
Bilgin, Begül   +2 more
core   +1 more source

The role and implications of mammalian cellular circadian entrainment

open access: yesFEBS Letters, EarlyView.
At their most fundamental level, mammalian circadian rhythms occur inside every individual cell. To tell the correct time, cells must align (or ‘entrain’) their circadian rhythm to the external environment. In this review, we highlight how cells entrain to the major circadian cues of light, feeding and temperature, and the implications this has for our
Priya Crosby
wiley   +1 more source

Cryptography, SPN algorithm and a simulation on S-Boxes [PDF]

open access: yes, 2013
It is impossible to imagine ourselves not involved in this tremendously increasingtechnology nowadays. In the field of networking, the area of network security consists of the provisions and policies adopted by the network administrator to prevent and ...
Blerina Celiku, Dhori Beta, Erma Pema
core  

Molecular bases of circadian magnesium rhythms across eukaryotes

open access: yesFEBS Letters, EarlyView.
Circadian rhythms in intracellular [Mg2+] exist across eukaryotic kingdoms. Central roles for Mg2+ in metabolism suggest that Mg2+ rhythms could regulate daily cellular energy and metabolism. In this Perspective paper, we propose that ancestral prokaryotic transport proteins could be responsible for mediating Mg2+ rhythms and posit a feedback model ...
Helen K. Feord, Gerben van Ooijen
wiley   +1 more source

The influence of S-boxes on the arrival of the cipher to the state of random substitution

open access: yesРадіоелектронні і комп'ютерні системи, 2023
The subject of this study is the process of developing block symmetric ciphers with improved cryptographic stability indicators for solving the problems of information protection in information and communication systems.
Iryna Lysytska   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy