-
61
Effect of the difference enumeration attack on LowMC instances
Published 2021-06-01Subjects: “…block cipher…”
Get full text
Article -
62
2-adic complexity of SLCE sequence
Published 2019-08-01Subjects: “…stream cipher…”
Get full text
Article -
63
Authenticated encryption mode with blocks skipping
Published 2021-10-01Subjects: Get full text
Article -
64
Cryptanalysis of IAR-CTR and IAR-CFB and a fixing method
Published 2025-01-01Subjects: Get full text
Article -
65
A digital audio data protection method using parametric action of generalised triangle group on GF(28)
Published 2025-01-01Subjects: Get full text
Article -
66
New related-key rectangle attack on 42-round SHACAL-2
Published 2009-01-01Subjects: “…block cipher…”
Get full text
Article -
67
Related-key rectangle attack on the full ARIRANG encryption mode
Published 2011-01-01Subjects: “…block cipher…”
Get full text
Article -
68
Improvement and evaluation for algebraic fault attacks on PRESENT
Published 2016-08-01Subjects: Get full text
Article -
69
SDN security control and forwarding method based on cipher identification
Published 2018-02-01Subjects: Get full text
Article -
70
High-performance and high-concurrency encryption scheme for Hadoop platform
Published 2019-12-01Subjects: Get full text
Article -
71
Side channel attack of cipher chips based on difference variability
Published 2015-03-01Subjects: “…cipher chip…”
Get full text
Article -
72
-
73
k-error linear complexity of q-ary sequence of period p<sup>2</sup>
Published 2019-12-01Subjects: “…stream cipher…”
Get full text
Article -
74
Round reduction-based fault attack on SM4 algorithm
Published 2016-10-01Subjects: Get full text
Article -
75
Stochastic job stream scheduling method for cipher chip with multi-cryptography
Published 2016-12-01Subjects: Get full text
Article -
76
Construction of diffusion layers based on cipher structures
Published 2017-06-01Subjects: “…block cipher…”
Get full text
Article -
77
-
78
«The black room» the Russian foreign Ministry against Napoleon
Published 2012-10-01Subjects: Get full text
Article -
79
One-way hash function construction based on Chen-type hyper-chaotic system and key-stream
Published 2009-01-01Subjects: Get full text
Article -
80
The 2-adic complexity and the 1-error 2-adic complexity of single cycle T-functions
Published 2014-03-01Subjects: “…stream cipher…”
Get full text
Article