Found: 873
Select item for more details and to access through your institution.
Zero-correlation linear analysis for block ciphers based on the Bernstein–Vazirani and Grover algorithms.
- Published in:
- Quantum Information Processing, 2024, v. 23, n. 8, p. 1, doi. 10.1007/s11128-024-04491-x
- By:
- Publication type:
- Article
GFSPX: an efficient lightweight block cipher for resource-constrained IoT nodes.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 17, p. 25256, doi. 10.1007/s11227-024-06412-2
- By:
- Publication type:
- Article
An encryption technique based on bilateral chaotic systems and fuzzy symbol encoding.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2024, v. 28, n. 15/16, p. 9005, doi. 10.1007/s00500-023-09144-2
- By:
- Publication type:
- Article
Power Attack Vulnerability Assessment of Circuit-Level PRESENT Encryption IP Using Artificial Intelligence Mechanisms.
- Published in:
- Journal of Circuits, Systems & Computers, 2024, v. 33, n. 14, p. 1, doi. 10.1142/S0218126624502451
- By:
- Publication type:
- Article
Differential–Linear Approximations of CHAM.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 16, p. 3141, doi. 10.3390/electronics13163141
- By:
- Publication type:
- Article
Group-Action-Based S-box Generation Technique for Enhanced Block Cipher Security and Robust Image Encryption Scheme.
- Published in:
- Symmetry (20738994), 2024, v. 16, n. 8, p. 954, doi. 10.3390/sym16080954
- By:
- Publication type:
- Article
Improved Cloud Storage Encryption Using Block Cipher-Based DNA Anti-Codify Model.
- Published in:
- Computer Systems Science & Engineering, 2023, v. 47, n. 1, p. 903, doi. 10.32604/csse.2023.029790
- By:
- Publication type:
- Article
Joint block and stream cipher based on a modified skew tent map.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 23, p. 33527, doi. 10.1007/s11042-019-08112-z
- By:
- Publication type:
- Article
Enhancing speed of SIMON: A light-weight-cryptographic algorithm for IoT applications.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 23, p. 32633, doi. 10.1007/s11042-018-6801-z
- By:
- Publication type:
- Article
A scheme based on algebraic and chaotic structures for the construction of substitution box.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 22, p. 32467, doi. 10.1007/s11042-019-07957-8
- By:
- Publication type:
- Article
A new construction of confusion component of block ciphers.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 22, p. 32585, doi. 10.1007/s11042-019-07866-w
- By:
- Publication type:
- Article
DNA Encoding and Channel Shuffling for Secured Encryption of Audio Data.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 17, p. 25019, doi. 10.1007/s11042-019-7696-z
- By:
- Publication type:
- Article
Design and Implementation of novel datapath designs of lightweight cipher RECTANGLE for resource constrained environment.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 16, p. 23659, doi. 10.1007/s11042-019-7587-3
- By:
- Publication type:
- Article
Lightweight, dynamic and efficient image encryption scheme.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 12, p. 16527, doi. 10.1007/s11042-018-7000-7
- By:
- Publication type:
- Article
Construction of new S-boxes based on triangle groups and its applications in copyright protection.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 11, p. 15527, doi. 10.1007/s11042-018-6953-x
- By:
- Publication type:
- Article
Cryptanalysis of hash functions based on blockciphers suitable for IoT service platform security.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 3, p. 3107, doi. 10.1007/s11042-018-5630-4
- By:
- Publication type:
- Article
Interoperable conditional access with video selective encryption for portable devices.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 11, p. 13139, doi. 10.1007/s11042-016-3725-3
- By:
- Publication type:
- Article
Block cipher based separable reversible data hiding in encrypted images.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 21, p. 13749, doi. 10.1007/s11042-015-2760-9
- By:
- Publication type:
- Article
Chaos based key expansion function for block ciphers.
- Published in:
- Multimedia Tools & Applications, 2013, v. 66, n. 2, p. 267, doi. 10.1007/s11042-011-0767-4
- By:
- Publication type:
- Article
CryptoHHO: a bio-inspired cryptosystem for data security in Fog–Cloud architecture.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 11, p. 15834, doi. 10.1007/s11227-024-06055-3
- By:
- Publication type:
- Article
Fault-tolerant and error-correcting 4-bit S-boxes for cryptography applications with multiple errors detection.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 2, p. 1464, doi. 10.1007/s11227-023-05530-7
- By:
- Publication type:
- Article
Construction of 24-by-24 nonlinear layer for symmetric algorithm and its application to data encryption in parallel with DNA transform.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 1, p. 1037, doi. 10.1007/s11227-023-05512-9
- By:
- Publication type:
- Article
CryptoQNRG: a new framework for evaluation of cryptographic strength in quantum and pseudorandom number generation for key-scheduling algorithms.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 11, p. 12219, doi. 10.1007/s11227-023-05115-4
- By:
- Publication type:
- Article
Hybrid cryptographic approach to enhance the mode of key management system in cloud environment.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 7, p. 7377, doi. 10.1007/s11227-022-04964-9
- By:
- Publication type:
- Article
A cluster-based practical key recovery attack on reduced-round AES using impossible-differential cryptanalysis.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 6, p. 6252, doi. 10.1007/s11227-022-04872-y
- By:
- Publication type:
- Article
ORSCA-GPU: one round stream cipher algorithm for GPU implementation.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 9, p. 11744, doi. 10.1007/s11227-022-04335-4
- By:
- Publication type:
- Article
A CPU-GPU-based parallel search algorithm for the best differential characteristics of block ciphers.
- Published in:
- Journal of Supercomputing, 2021, v. 77, n. 10, p. 11460, doi. 10.1007/s11227-021-03703-w
- By:
- Publication type:
- Article
Biclique cryptanalysis of PRESENT-80 and PRESENT-128.
- Published in:
- Journal of Supercomputing, 2014, v. 70, n. 1, p. 95, doi. 10.1007/s11227-014-1103-3
- By:
- Publication type:
- Article
Near-optimal self-stabilising counting and firing squads.
- Published in:
- Distributed Computing, 2019, v. 32, n. 4, p. 339, doi. 10.1007/s00446-018-0342-6
- By:
- Publication type:
- Article
Lightweight Structure of Random Key Generation for PRESENT Block Cipher.
- Published in:
- International Journal of Industrial Electronics Control & Optimization, 2024, v. 7, n. 1, p. 41
- By:
- Publication type:
- Article
Bit‐level evaluation of piccolo block cipher by satisfiability problem solver.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 4, p. 616, doi. 10.1049/ise2.12119
- By:
- Publication type:
- Article
Meet‐in‐the‐middle attacks on round‐reduced CRAFT based on automatic search.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 3, p. 534, doi. 10.1049/ise2.12114
- By:
- Publication type:
- Article
Improved related‐tweakey rectangle attacks on round‐reduced Deoxys‐BC.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 3, p. 407, doi. 10.1049/ise2.12104
- By:
- Publication type:
- Article
Conditional differential analysis on the KATAN ciphers based on deep learning.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 3, p. 347, doi. 10.1049/ise2.12099
- By:
- Publication type:
- Article
Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post‐quantum proposals.
- Published in:
- 2023
- By:
- Publication type:
- Editorial
Recent progress in the security evaluation of multivariate public‐key cryptography.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 2, p. 210, doi. 10.1049/ise2.12092
- By:
- Publication type:
- Article
Guest Editorial: Selected papers from the 24th International Conference on Information Security and Cryptology (ICISC 2021).
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 1, p. 1, doi. 10.1049/ise2.12096
- By:
- Publication type:
- Article
Improved integral cryptanalysis of SPNbox in digital rights management systems.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 1, p. 147, doi. 10.1049/ise2.12087
- By:
- Publication type:
- Article
Experimental evaluation of differential fault attack on lightweight block cipher PIPO.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 1, p. 80, doi. 10.1049/ise2.12078
- By:
- Publication type:
- Article
Characteristic automated search of cryptographic algorithms for distinguishing attacks (CASCADA).
- Published in:
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 6, p. 470, doi. 10.1049/ise2.12077
- By:
- Publication type:
- Article
Security evaluation on type‐1 and type‐1‐like 4‐branch generalized Feistel structures and application to reduced‐round Lesamnta‐LW‐BC.
- Published in:
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 5, p. 390, doi. 10.1049/ise2.12065
- By:
- Publication type:
- Article
New indifferentiability security proof of MDPH hash function.
- Published in:
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 4, p. 262, doi. 10.1049/ise2.12058
- By:
- Publication type:
- Article
Improved rotational‐XOR cryptanalysis of Simon‐like block ciphers.
- Published in:
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 4, p. 282, doi. 10.1049/ise2.12061
- By:
- Publication type:
- Article
Efficient constructions for large‐state block ciphers based on AES New Instructions.
- Published in:
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 3, p. 145, doi. 10.1049/ise2.12053
- By:
- Publication type:
- Article
On the upper bound of squared correlation of SIMON‐like functions and its applications.
- Published in:
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 3, p. 220, doi. 10.1049/ise2.12057
- By:
- Publication type:
- Article
Cryptanalysis of a white‐box SM4 implementation based on collision attack.
- Published in:
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 1, p. 18, doi. 10.1049/ise2.12045
- By:
- Publication type:
- Article
Fault attacks on authenticated encryption modes for GIFT.
- Published in:
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 1, p. 51, doi. 10.1049/ise2.12041
- By:
- Publication type:
- Article
DGC‐UWnet: Underwater image enhancement based on computation‐efficient convolution and channel shuffle.
- Published in:
- IET Image Processing (Wiley-Blackwell), 2023, v. 17, n. 7, p. 2158, doi. 10.1049/ipr2.12781
- By:
- Publication type:
- Article
Proposed a Variable Length Block Cipher Algorithm.
- Published in:
- Journal of College of Education, 2017, v. 1, n. 3, p. 93
- By:
- Publication type:
- Article
Pengamanan Data Kombinasi Metode Cipher Block Chaining dan Modifikasi LSB.
- Published in:
- Techno.com, 2020, v. 19, n. 1, p. 97, doi. 10.33633/tc.v19i1.3375
- By:
- Publication type:
- Article