Search

Your search keyword '"Block cipher"' showing total 8,184 results

Search Constraints

Start Over You searched for: Descriptor "Block cipher" Remove constraint Descriptor: "Block cipher"
8,184 results on '"Block cipher"'

Search Results

351. A Complete Tolerant Algebraic Side-Channel Attack for AES with CP

352. Integer Linear Programming for Three-Subset Meet-in-the-Middle Attacks: Application to GIFT

353. Bounds on Differential and Linear Branch Number of Permutations

354. Lightweight Fault Attack Resistance in Software Using Intra-instruction Redundancy, Revisited

355. Related-Key Boomerang Attacks on Full ANU Lightweight Block Cipher

356. An Improved Affine Equivalence Algorithm for Random Permutations

357. Count-then-Permute: A Precision-Free Alternative to Inversion Sampling

358. Influence of Error on Hamming Weights for ASCA

359. Differential Fault Attack on SIMON with Very Few Faults

360. Processing Analysis of Confidential Modes of Operation

361. Differential Fault Attack on SKINNY Block Cipher

362. Improved Automatic Search Algorithm for Differential and Linear Cryptanalysis on SIMECK and the Applications

363. The Research of Cryptosystem Recognition Based on Randomness Test’s Return Value

364. Integral and Impossible Differential Cryptanalysis of RC6

365. Error Tolerant ASCA on FPGA

366. LAO-3D: A Symmetric Lightweight Block Cipher Based on 3D Permutation for Mobile Encryption Application

367. A Novel Secure End-to-End IoT Communication Scheme Using Lightweight Cryptography Based on Block Cipher

368. On the design and implementation of secure network protocols

369. The SPEEDY Family of Block Ciphers

370. Optimizing GOST R 34.12 'Magma' Algorithms for 8-Bit Microcontrollers

371. A Novel Lightweight Block Encryption Algorithm Based on Combined Chaotic S-Box.

372. Lightweight 8‐bit S‐box and combined S‐box/S‐box−1 for cryptographic applications.

373. Image encryption under spatial domain based on modify 2D LSCM chaotic map via dynamic substitution-permutation network.

374. SECURE RSA CRYPTOSYSTEM BASED ON MULTIPLE KEYS.

375. LBC-IoT: Lightweight Block Cipher for IoT Constraint Devices.

376. A performance comparison of lightweight cryptographic algorithms suitable for IoT transmissions.

377. LWARX: Lightweight ARX white-box cipher for satellite communications.

378. Region of interest-based medical image encryption technique based on chaotic S-boxes.

379. LoPher: SAT-Hardened Logic Embedding on Block Ciphers.

380. 64 Bit Block Cipher Cryptography Design Based on Traditional Game Patterns with West Java

381. An anti-power attack circuit design for block cipher

382. Integral fault analysis of the ARIA cipher

383. A Novel Cryptographic Substitution Box Design Using Gaussian Distribution

384. A Novel Block Encryption Algorithm Based on Chaotic S-Box for Wireless Sensor Network

385. Evaluation of SPN-Based Lightweight Crypto-Ciphers

386. Cryptanalysis of Reduced-Round SPECK

387. A Novel Design of Cryptographic SP-Network Based on Gold Sequences and Chaotic Logistic Tent System

388. High Throughput Implementation of SMS4 on FPGA

389. Construction of Cryptographic S-Boxes Based on Mobius Transformation and Chaotic Tent-Sine System

390. Loong: A Family of Involutional Lightweight Block Cipher Based on SPN Structure

391. Multiple Impossible Differentials Attack on AES-192

392. More Constructions of Light MDS Transforms Based on Known MDS Circulant Matrices

393. Secure Image Encryption Using Chaotic, Hybrid Chaotic and Block Cipher Approach

394. JPEG2000 Compatible Layered Block Cipher

395. An Efficient VLSI Architecture for PRESENT Block Cipher and Its FPGA Implementation

396. Cryptanalysis of Rijndael-192/224 in Single Key Setting

397. Low-Data Complexity Attacks on Camellia

398. Improving Security of SPN-Type Block Cipher Against Fault Attack

Catalog

Books, media, physical & digital resources