Results 31 to 40 of about 480,128 (291)
An efficient construction of key-dependent substitution box based on chaotic sine map
A substitution box is a core component of the popular symmetric-key algorithms. However, the major problem of the conventional substitution boxes is the statistic behavior, which is employed as a fixed-size lookup table.
Muhammad Usama +3 more
doaj +1 more source
Distribusi Difference dari S-Box Berbasis Fungsi Balikan Pada GF(28)
Substitution-box (s-box) is a basic component of block cipher which performs a substitution. Two powerful cryptanalysis techniques applied to block ciphers are linear cryptanalysis and differential cryptanalysis.
Andriani Adi Lestari, Nunik Yulianingsih
doaj +1 more source
This paper proposes to present a novel method of generating cryptographic dynamic substitution-boxes, which makes use of the combined effect of discrete hyperchaos mapping and algebraic group theory.
Musheer Ahmad, Eesa Al-Solami
doaj +1 more source
Designing S-Box Using Tent-Sine Chaotic System While Combining the Traits of Tent and Sine Map
Secure exchange of sensitive information between different entities is a serious challenge in today’s environment. Therefore, various cryptosystems have been created specifically for this purpose. Various operations are used in these cryptosystems.
Annas Wasim Malik +4 more
doaj +1 more source
Efficient and Secure Chaotic S-Box for Wireless Sensor Network [PDF]
International audienceInformation security using chaotic dynamics is a novel topic in the wireless sensor network (WSN) research field. After surveying analog and digital chaotic security systems, we give a state of the art of chaotic S-Box design.
Alvarez +23 more
core +4 more sources
Understanding the Technological Substitution by Hybrid Modelling Practice: a Methodological Approach
Various novel climate technologies and eco-innovations have already reached a mature state, but they diffuse slowly into the market. Due to this slow process the mitigation of climate change does not take the most effective path.
L. Timma, A. Blumberga, D. Blumberga
doaj +1 more source
(Leftmost-Outermost) Beta Reduction is Invariant, Indeed [PDF]
Slot and van Emde Boas' weak invariance thesis states that reasonable machines can simulate each other within a polynomially overhead in time. Is lambda-calculus a reasonable machine?
Accattoli, Beniamino, Lago, Ugo Dal
core +5 more sources
Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution
The evolution of wireless and mobile communication from 0G to the upcoming 5G gives rise to data sharing through the Internet. This data transfer via open public networks are susceptible to several types of attacks.
Abdullah Qayyum +7 more
doaj +1 more source
The basic principle of encryption is to transform plain data into unintelligible data via a series of steps referred to as an encryption algorithm. The input to this algorithm is called plaintext, and its output encoded version is called as cipher text.
Aaruni P M +4 more
openaire +1 more source
Ligand Substitution Dynamics [PDF]
Substitution of a ligand in an inner sphere complex by an outside group is the most fundamental reaction in metal ion ...
Gray, Harry B., Langford, Cooper H.
core +1 more source

