Results 61 to 70 of about 435,325 (313)
This paper proposes a novel method of constructing strong substitution-boxes (S-boxes) of order n (4 ≤ n ≤ 8) based on a recent optimization algorithm known as sine-cosine algorithm (SCA). The paper also proposes a new 1D chaotic map, which owns enhanced
Amer Awad Alzaidi +3 more
doaj +1 more source
The success of AES encryption standard created challenges for the cryptographers to construct strong substitution-boxes using different underlying approaches.
Abdul Razaq +6 more
doaj +1 more source
Summary: It is well known that there does not exist a Boolean function \( f\:\mathbb Z^m_2\to \mathbb Z^n_2\) satisfying both basic cryptologic criteria, balancedness and perfect nonlinearity. Previously, \textit{O.~Grošek, L.~ Satko} and \textit{K.~Nemoga} [``Ideal difference tables from an algebraic point of view'', in: P. Caballero-Gil et al. (eds.),
Ladislav Satko +2 more
openaire +2 more sources
Исследование свойств подстановок ГОСТ 28147-89, построенных на основе анализа свойств координатных функций [PDF]
It is shown, that known requirements to S boxes of GOST 28147-89 allow to use permutations, which make cipher vulnerable to differential cryptanalysis.Показано, что известные требования к подстановкам ГОСТ 28147-89 позволяют использовать заполнение узлов
Лисицкая, Ирина +2 more
core
Integration of circadian and hypoxia signaling via non‐canonical heterodimerization
CLOCK, BMAL1, and HIFs are basic helix‐loop‐helix and Per‐Arnt‐Sim domain (bHLH‐PAS) proteins, which function as transcription factors. bHLH‐PAS proteins are designated in two classes. Many class I proteins are regulated by environmental signals via their PAS domains, but such signals have not been identified for all.
Sicong Wang, Katja A. Lamia
wiley +1 more source
Systematic Review of Image Encryption Using Dynamic Encryption Techniques: an Article Review
In this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enables images to be encrypted or decrypted using S-boxes. The proposed method consists of two stages. The
Zaid Kubah +3 more
doaj +1 more source
Time after time – circadian clocks through the lens of oscillator theory
Oscillator theory bridges physics and circadian biology. Damped oscillators require external drivers, while limit cycles emerge from delayed feedback and nonlinearities. Coupling enables tissue‐level coherence, and entrainment aligns internal clocks with environmental cues.
Marta del Olmo +2 more
wiley +1 more source
The kth order nonhomomorphicity of S-boxes
JUCS - Journal of Universal Computer Science Volume Nr.
Zheng, Yuliang, Zhang, Xian-Mo
openaire +3 more sources
On the Derivative Imbalance and Ambiguity of Functions
In 2007, Carlet and Ding introduced two parameters, denoted by $Nb_F$ and $NB_F$, quantifying respectively the balancedness of general functions $F$ between finite Abelian groups and the (global) balancedness of their derivatives $D_a F(x)=F(x+a)-F(x)$, $
Carlet, Claude +3 more
core +2 more sources
Cryptochrome and PAS/LOV proteins play intricate roles in circadian clocks where they act as both sensors and mediators of protein–protein interactions. Their ubiquitous presence in signaling networks has positioned them as targets for small‐molecule therapeutics. This review provides a structural introduction to these protein families.
Eric D. Brinckman +2 more
wiley +1 more source

