Search

Your search keyword '"Block cipher"' showing total 8,184 results

Search Constraints

Start Over You searched for: Descriptor "Block cipher" Remove constraint Descriptor: "Block cipher"
8,184 results on '"Block cipher"'

Search Results

1. Truncated Differential Cryptanalysis of the SPRING Block Cipher

2. Recommendation for block cipher modes of operation : the CCM mode for authentication and confidentiality

3. AN EFFICIENT CRYPTOGRAPHIC SCHEME BASED ON OPTIMIZED WATERMARKING SCHEME FOR SECURING INTERNET OF THINGS.

4. Improved Execution Efficiency of FPE Scheme Algorithm Based on Structural Optimization.

5. An ultra-lightweight block cipher with string transformations.

6. Review on lightweight cryptography techniques and steganography techniques for IoT environment.

7. Yoyo attack on 4-round Lai-Massey scheme with secret round functions.

8. Meet-in-the-middle attacks on AES with value constraints.

9. Differential–Linear Approximations of CHAM.

10. Zero-correlation linear analysis for block ciphers based on the Bernstein–Vazirani and Grover algorithms.

11. An encryption technique based on bilateral chaotic systems and fuzzy symbol encoding.

12. Comprehensive Neural Cryptanalysis on Block Ciphers Using Different Encryption Methods.

13. Boomerang Attacks on Reduced-Round Midori64.

14. Multilevel Cryptography Model using RC5, Twofish, and Modified Serpent Algorithms.

15. 分组密码 FBC 的截断差分分析.

16. Impossible Differential Cryptanalysis of the Raindrop Block Cipher

17. New Strategy for Evaluating Differential Clustering Effect of uBlock

22. Falling into Bytes and Pieces – Cryptanalysis of an Apple Patent Application

23. From Substitution Box to Threshold

25. Differential-Linear Cryptanalysis of Round-Reduced SPARX-64/128

26. Using the Capabilities of Artificial Neural Networks in the Cryptanalysis of Symmetric Lightweight Block Ciphers

28. A New Higher Order Differential of LCB

29. Exploring Data Encryption Standard (DES) Through CrypTool Implementation: A Comprehensive Examination and Historical Perspective

30. Rectangle Attacks on Reduced Versions of the FBC Block Cipher

31. Differential Fault Analysis Against AES Based on a Hybrid Fault Model

35. 64-비트 ARMv8 프로세서 상에서의 개선된 병렬 ARIA 최적화 구현.

36. Observations on the branch number and differential analysis of SPEEDY.

37. A multilevel qubit encryption mechanism using SHA-512.

38. Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher.

39. Differential Fault and Algebraic Equation Combined Analysis on PICO.

40. Lower data attacks on Advanced Encryption Standard.

41. SUMER: A New Family of Lightweight and Traditional Block Ciphers with Multi-Modes

42. Lightweight Block and Stream Cipher Algorithm: A Review

43. New Linear Trails and Linear Hulls of CHAM

44. A Novel Scheme for Construction of S-Box Using Action of Power Associative Loop and Its Applications in Text Encryption

45. SHC: 8-bit Compact and Efficient S-Box Structure for Lightweight Cryptography

46. WAS: improved white-box cryptographic algorithm over AS iteration

47. Explicit Upper Bound Of Impossible Differentials For AES-Like Ciphers: Application To uBlock And Midori.

48. Revisited Security Evaluation on Midori-64 against Differential Cryptanalysis.

49. 新形态对称密码算法研究.

50. Construction of nonlinear component based on bent Boolean functions.

Catalog

Books, media, physical & digital resources