Results 31 to 40 of about 482,791 (290)
(Leftmost-Outermost) Beta Reduction is Invariant, Indeed [PDF]
Slot and van Emde Boas' weak invariance thesis states that reasonable machines can simulate each other within a polynomially overhead in time. Is lambda-calculus a reasonable machine?
Accattoli, Beniamino, Lago, Ugo Dal
core +5 more sources
Distribusi Difference dari S-Box Berbasis Fungsi Balikan Pada GF(28)
Substitution-box (s-box) is a basic component of block cipher which performs a substitution. Two powerful cryptanalysis techniques applied to block ciphers are linear cryptanalysis and differential cryptanalysis.
Andriani Adi Lestari, Nunik Yulianingsih
doaj +1 more source
Dynamic S-Box Design Using a Novel Square Polynomial Transformation and Permutation
New era ciphers employ substitution boxes (S-boxes) which assist in the provision of security for the plaintext in the encryption phase and transforming the ciphertext on the receiver side into original plaintext in the decryption phase.
Amjad Hussain Zahid +11 more
doaj +1 more source
This paper proposes to present a novel method of generating cryptographic dynamic substitution-boxes, which makes use of the combined effect of discrete hyperchaos mapping and algebraic group theory.
Musheer Ahmad, Eesa Al-Solami
doaj +1 more source
Understanding the Technological Substitution by Hybrid Modelling Practice: a Methodological Approach
Various novel climate technologies and eco-innovations have already reached a mature state, but they diffuse slowly into the market. Due to this slow process the mitigation of climate change does not take the most effective path.
L. Timma, A. Blumberga, D. Blumberga
doaj +1 more source
The basic principle of encryption is to transform plain data into unintelligible data via a series of steps referred to as an encryption algorithm. The input to this algorithm is called plaintext, and its output encoded version is called as cipher text.
Aaruni P M +4 more
openaire +1 more source
Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution
The evolution of wireless and mobile communication from 0G to the upcoming 5G gives rise to data sharing through the Internet. This data transfer via open public networks are susceptible to several types of attacks.
Abdullah Qayyum +7 more
doaj +1 more source
Ligand Substitution Dynamics [PDF]
Substitution of a ligand in an inner sphere complex by an outside group is the most fundamental reaction in metal ion ...
Gray, Harry B., Langford, Cooper H.
core +1 more source
Efficient and Secure Chaotic S-Box for Wireless Sensor Network [PDF]
International audienceInformation security using chaotic dynamics is a novel topic in the wireless sensor network (WSN) research field. After surveying analog and digital chaotic security systems, we give a state of the art of chaotic S-Box design.
Alvarez +23 more
core +4 more sources
Method to Improve the Cryptographic Properties of S-Boxes
This study presents a method based on elementary logic and arithmetic operations to enhance the cryptographic properties of Substitution Boxes (S-Boxes).
Jesus Agustin Aboytes-Gonzalez +4 more
doaj +1 more source

