Showing 1 - 20 results of 66 for search '"cipher"', query time: 0.06s Refine Results
  1. 1

    Cryptanalysis of Loiss Stream Cipher-Revisited by Lin Ding, Chenhui Jin, Jie Guan, Qiuyan Wang

    Published 2014-01-01
    “…Loiss is a novel byte-oriented stream cipher proposed in 2011. In this paper, based on solving systems of linear equations, we propose an improved Guess and Determine attack on Loiss with a time complexity of 2231 and a data complexity of 268, which reduces the time complexity of the Guess and Determine attack proposed by the designers by a factor of 216. …”
    Get full text
    Article
  2. 2

    Similarity Property and Slide Attack of Block Cipher FESH by Yafei Zheng, Wenling Wu

    Published 2023-01-01
    “…This paper focuses on similarity properties and extension of the classical slide property of block ciphers. Taking FESH, an award-winning block cipher of the National Cryptographic Algorithm Design Competition 2019, as an example, similarity properties of the encryption and key transformation are found, owing to the similar structures that the encryption and key transformation adopted, and the constants generation. …”
    Get full text
    Article
  3. 3

    IoT enabled data protection with substitution box for lightweight ciphers by K.B. Sarmila, S.V. Manisekaran

    Published 2025-03-01
    “…With the increased bit length of 5, it is observed that DAC exhibits excellent flexibility with traditional block cipher techniques, thus simplifying the use of such a solution as a building block of cryptographic primitives.…”
    Get full text
    Article
  4. 4

    The Security Weakness of Block Cipher Piccolo against Fault Analysis by Junghwan Song, Kwanhyung Lee, Younghoon Jung

    Published 2014-03-01
    “…Piccolo is a 64-bit lightweight block cipher which is able to be implemented in constrained hardware environments such as a wireless sensor network. …”
    Get full text
    Article
  5. 5

    Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK by Sugio Nobuyuki

    Published 2023-01-01
    “…Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment. …”
    Get full text
    Article
  6. 6
  7. 7

    In-depth study of lightweight block ciphers: Performance assessment and implementation on sensor motes by Amal Hkiri, Mouna Karmani, Fawaz Hasan Alasmary, Omar Ben Bahri, Ahmed Mohammed Murayr, Mohsen Machhout

    Published 2025-02-01
    “…The results reveal that the SPARX cipher emerged as the most resource-efficient, with the lowest memory footprint, while the RECTANGLE cipher required more memory across platforms.…”
    Get full text
    Article
  8. 8

    Shannon's Random-Cipher Result and the Generalized R-Norm Entropy of Type β by Satish Kumar, Arun Choudhary

    Published 2013-01-01
    “…Using the Fano inequality for the generalized R-norm entropy and Bayess probability of error, a generalized random-cipher result is proved by taking into account the generalized R-norm entropy of type β.…”
    Get full text
    Article
  9. 9

    Efficient constructions for large‐state block ciphers based on AES New Instructions by Rentaro Shiba, Kosei Sakamoto, Takanori Isobe

    Published 2022-05-01
    Subjects: “…AES‐NI, block cipher, cryptography, private key cryptography…”
    Get full text
    Article
  10. 10

    Comment on ‘Targeted Ciphers for Format‐Preserving Encryption’ from Selected Areas in Cryptography 2018 by Dachao Wang, Baocang Wang, Yuan Ping

    Published 2021-09-01
    “…In Selected Areas in Cryptography 2018, two targeted ciphers were proposed as new FPE schemes. The second scheme was designed with an algorithm called Mix–Swap–Unmix that is shown to be equivalent to a particular matching exchange process under a specific setting. …”
    Get full text
    Article
  11. 11

    Performance evaluation of the SM4 cipher based on field‐programmable gate array implementation by Sa'ed Abed, Reem Jaffal, Bassam Jamil Mohd, Mohammad Alshayeji

    Published 2021-03-01
    “…The SM4 cipher is one of the common block ciphers, which can be easily implemented and offers a high level of security. …”
    Get full text
    Article
  12. 12

    Chaotic Stream Cipher-Based Secure Data Communications over Intelligent Transportation Network by Wei Zhang, Shanyu Tang, Liping Zhang, Zhao Ma, Jun Song

    Published 2015-01-01
    “…To address the above security problems, we proposed a chaotic stream cipher-based cryptographic scheme to realise secure data communications over wireless sensor network (WSN), which is a part of ITS. …”
    Get full text
    Article
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20