Search

Showing total 733 results

Search Constraints

Start Over You searched for: Search Limiters Full Text Remove constraint Search Limiters: Full Text Topic block ciphers Remove constraint Topic: block ciphers Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
733 results

Search Results

1. Guest Editorial: Selected papers from the 24th International Conference on Information Security and Cryptology (ICISC 2021).

2. A Performance Analysis of Security Protocols for Distributed Measurement Systems Based on Internet of Things with Constrained Hardware and Open Source Infrastructures.

3. Research on Dynamic Searchable Encryption Method Based on Bloom Filter.

4. Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography.

5. A Polynomial Multiplication Accelerator for Faster Lattice Cipher Algorithm in Security Chip.

6. Construction of secure adaptive frequency hopping sequence sets based on AES algorithm.

7. Mixture Differential Cryptanalysis on Round-Reduced SIMON32/64 Using Machine Learning.

8. Observations on the branch number and differential analysis of SPEEDY.

9. Development of Security Rules and Mechanisms to Protect Data from Assaults.

10. Comprehensive Neural Cryptanalysis on Block Ciphers Using Different Encryption Methods.

11. Efficient implementation of the linear layer of block ciphers with large MDS matrices based on a new lookup table technique.

12. Integral Cryptanalysis of Reduced-Round IIoTBC-A and Full IIoTBC-B.

14. New mode of operation inspired by the braid of long hair.

15. Weak rotational property and its application.

16. The state diagram of χ.

17. Quantum Implementation of AIM: Aiming for Low-Depth.

18. Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher.

19. Differential Fault and Algebraic Equation Combined Analysis on PICO.

20. Quantum Implementation of the SAND Algorithm and Its Quantum Resource Estimation for Brute-Force Attack.

21. Enhanced ARIA-based counter mode deterministic random bit generator random number generator implemented in verilog.

22. An ASCON AOP-SystemC Environment for Security Fault Analysis.

23. Achieving Privacy-Preserving and Lightweight Truth Discovery in Mobile Crowdsensing.

24. Enhancing Security in ZigBee Wireless Sensor Networks: A New Approach and Mutual Authentication Scheme for D2D Communication.

25. Quantum Neural Network Based Distinguisher on SPECK-32/64.

26. Chaos-Based Image Encryption: Review, Application, and Challenges.

27. Efficient Attack Scheme against SKINNY-64 Based on Algebraic Fault Analysis.

28. Deep-Learning-based Cryptanalysis through Topic Modeling.

29. An On-Demand Fault-Tolerant Routing Strategy for Secure Key Distribution Network.

30. BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers.

31. MILP modeling of matrix multiplication: cryptanalysis of KLEIN and PRINCE.

32. Full-round impossible differential attack on shadow block cipher.

33. Blocking Linear Cryptanalysis Attacks Found on Cryptographic Algorithms Used on Internet of Thing Based on the Novel Approaches of Using Galois Field (GF (2 32)) and High Irreducible Polynomials.

34. Another look at key randomisation hypotheses.

35. Memristor-based PUF for lightweight cryptographic randomness.

36. On the upper bound of squared correlation of SIMON‐like functions and its applications.

37. Recent progress in the security evaluation of multivariate public‐key cryptography.

38. A Provable Secure Cybersecurity Mechanism Based on Combination of Lightweight Cryptography and Authentication for Internet of Things.

39. 4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices.

40. Bounding the length of impossible differentials for SPN block ciphers.

41. A deep learning aided differential distinguisher improvement framework with more lightweight and universality.

42. New method for combining Matsui's bounding conditions with sequential encoding method.

43. LSAV: Lightweight source address validation in SDN to counteract IP spoofing-based DDoS attacks.

44. An efficient permutation approach for SbPN-based symmetric block ciphers.

45. Improved Cloud Storage Encryption Using Block Cipher-Based DNA Anti-Codify Model.

46. Lightweight Cryptography for Connected Vehicles Communication Security on Edge Devices.

47. On the Cryptanalysis of a Simplified AES Using a Hybrid Binary Grey Wolf Optimization.

48. Enhancing IoT Security: An Innovative Key Management System for Lightweight Block Ciphers.

49. Efficient hardware mapping of Boolean substitution boxes based on functional decomposition for RFID and ISM band IoT applications.

50. Automated Classical Cipher Emulation Attacks via Unified Unsupervised Generative Adversarial Networks.