-
1
A Novel Construction of Substitution Box Based on Polynomial Mapped and Finite Field With Image Encryption Application
Published 2022-01-01Subjects: Get full text
Article -
2
Identification on the structures of block ciphers using machine learning
Published 2023-06-01Subjects: “…block ciphers…”
Get full text
Article -
3
Enhancing the robustness of block ciphers through a graphical S-box evolution scheme for secure multimedia applications
Published 2024-12-01Subjects: Get full text
Article -
4
Light block cipher algorithm for electric power industry
Published 2015-12-01Subjects: Get full text
Article -
5
Differential fault attack on lightweight block cipher Klein
Published 2016-10-01Subjects: “…block cipher…”
Get full text
Article -
6
Integral attack on MIBS block cipher
Published 2014-07-01Subjects: “…block cipher…”
Get full text
Article -
7
Meet-in-the-middle attacks on FOX block cipher
Published 2016-08-01Subjects: “…block cipher…”
Get full text
Article -
8
3-subset meet-in-the-middle attack on block cipher TWIS
Published 2014-06-01Subjects: “…block cipher…”
Get full text
Article -
9
Differential-linear cryptanalysis of PRINCE cipher
Published 2021-08-01Subjects: “…lightweight block cipher…”
Get full text
Article -
10
Biclique cryptanalysis on lightweight block ciphers I-PRESENT-80 and I-PRESENT-128
Published 2017-11-01Subjects: “…lightweight block cipher…”
Get full text
Article -
11
-
12
Block cipher based on T-shaped cellular automata
Published 2009-01-01Subjects: Get full text
Article -
13
Efficient constructions for large‐state block ciphers based on AES New Instructions
Published 2022-05-01Subjects: “…AES‐NI, block cipher, cryptography, private key cryptography…”
Get full text
Article -
14
Automatic search algorithm for differential characteristics in ARX ciphers
Published 2016-05-01Subjects: “…block cipher…”
Get full text
Article -
15
Design and Research of S-Box Based on Dynamic Strategy
Published 2015-11-01Subjects: “…block cipher…”
Get full text
Article -
16
A Novel Scheme for Construction of S-Box Using Action of Power Associative Loop and Its Applications in Text Encryption
Published 2024-01-01Subjects: Get full text
Article -
17
-
18
Improved meet-in-the-middle attack on Joltik-BC-128
Published 2024-10-01Subjects: “…block cipher…”
Get full text
Article -
19
Zero correlation-integral attack of MIBS block cipher
Published 2016-11-01Subjects: “…block cipher…”
Get full text
Article -
20
Related-key impossible boomerang cryptanalysis on TWINE
Published 2019-09-01Subjects: Get full text
Article