-
221
LWARX: Lightweight ARX white-box cipher for satellite communications
Published 2024-04-01Subjects: Get full text
Article -
222
SIPFA: Statistical Ineffective Persistent Faults Analysis on Feistel Ciphers
Published 2022-06-01Subjects: Get full text
Article -
223
New forgery attack on the authenticated cipher SCREAM and iSCREAM
Published 2016-01-01“…Recently, authentica-tion encryption algorithms have received attentions extensively since the event of CAESAR cipher solicitation was developed. SCREAM had been selected as one of the second-round candidates in CAESAR competition because of its novel structure and design idea. …”
Get full text
Article -
224
LIZARD – A Lightweight Stream Cipher for Power-constrained Devices
Published 2017-03-01Subjects: “…Stream Ciphers…”
Get full text
Article -
225
Hybridization of Genetic Algorithm with Neural Networks to Cipher English Texts
Published 2010-12-01Subjects: Get full text
Article -
226
Measuring Avalanche Properties on RC4 Stream Cipher Variants
Published 2021-10-01Subjects: Get full text
Article -
227
Cryptanalyzing an image cipher using multiple chaos and DNA operations
Published 2023-07-01“…Recently, an improved color image cipher (ICIC-DNA) based on multiple deoxyribonucleic acid (DNA) sequence operations with DNA synthetic image and chaos was proposed. …”
Get full text
Article -
228
SCLang: Graphical Domain-Specific Modeling Language for Stream Cipher
Published 2023-06-01Subjects: “…stream cipher…”
Get full text
Article -
229
General Differential Fault Attack on PRESENT and GIFT Cipher With Nibble
Published 2021-01-01Subjects: Get full text
Article -
230
On the dynamic reconfigurable implementations of MISTY1 and KASUMI block ciphers.
Published 2023-01-01“…Novel hardware architectures for dynamic reconfigurable implementation of 64-bit MISTY1 and KASUMI block ciphers are proposed to enhance the performance of cryptographic chips for secure IoT applications. …”
Get full text
Article -
231
FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher
Published 2019-02-01Subjects: Get full text
Article -
232
On the resistance of new lightweight block ciphers against differential cryptanalysis
Published 2023-04-01Subjects: Get full text
Article -
233
On the dynamic reconfigurable implementations of MISTY1 and KASUMI block ciphers
Published 2023-01-01Get full text
Article -
234
Reconfiurable multi-launch pipeline processing architecture for block cipher
Published 2020-04-01“…With the wide application of reconfigurable design technology in the field of cryptography, the existing reconfigurable cryptography system can hardly meet the needs of high-speed communication and equipment miniaturization.Therefore, it is the goal of this paper to design a high performance reconfigurable processing architecture that can flexibly implement block cipher algorithms.Based on the reconfigurable array structure and the multi-launch mechanism, this paper proposes a reconfigurable multi-launch pipeline processing architecture to solve the problems of low throughput and low resource utilization of the reconfigurable cryptography system.This architecture is able to transmit multiple packets in parallel and pipeline processing, and has higher throughput and unit utilization, which greatly improves the algorithm performance of the reconfigurable system.Experiments show that the throughput of AES can reach 3.19 Gb/s under the operating frequency of 350 MHz.Compared with the single-launch structure, its performance improved by about 1.1 times.…”
Get full text
Article -
235
On the Application of Evolutionary Computation Techniques in Designing Stream Cipher Systems
Published 2011-10-01Subjects: “…Genetic Programming; Simulated Annealing; Stream Ciphers; Automated System Design.…”
Get full text
Article -
236
Another Perspective on Automatic Construction of Integral Distinguishers for ARX Ciphers
Published 2022-02-01Subjects: Get full text
Article -
237
Rigorous upper bounds on data complexities of block cipher cryptanalysis
Published 2017-10-01Subjects: “…block cipher…”
Get full text
Article -
238
Sypher’s Cipher: ‘Paradoxes of Conduct’ in the Reception of Mannerism, 1954-1973
Published 2019-06-01Get full text
Article -
239
Proposed A Permutation and Substitution Methods of Serpent Block Cipher
Published 2019-05-01Subjects: “…Serpent block cipher, initial and final permutation, substitutions boxes, key generation, logistic chaos map, standard chaos map.…”
Get full text
Article -
240
Area-Efficient Hardware Architectures of MISTY1 Block Cipher
Published 2018-06-01“…In this paper, state-of-the-art hardware implementations of MISTY1 block cipher are presented for area-constrained wireless applications. …”
Get full text
Article