Showing 21 - 40 results of 2,263 for search '"cipher"', query time: 0.10s Refine Results
  1. 21
  2. 22
  3. 23
  4. 24
  5. 25
  6. 26

    Cryptanalysis of HALFLOOP Block Ciphers by Gregor Leander, Shahram Rasoolzadeh, Lukas Stennes

    Published 2023-12-01
    “…Recently, it was shown in [DDLS22] that the smallest version of the cipher, HALFLOOP-24, can be attacked within a practical time and memory complexity. …”
    Get full text
    Article
  7. 27

    Fixslicing AES-like Ciphers by Alexandre Adomnicai, Thomas Peyrin

    Published 2020-12-01
    “…The fixslicing implementation strategy was originally introduced as a new representation for the hardware-oriented GIFT block cipher to achieve very efficient software constant-time implementations. …”
    Get full text
    Article
  8. 28

    CIPHERS OF CHANGE: MUSIC AND APOCALYPSE by Sander van Maas

    Published 2022-12-01
    “…Again, music appears as a figure (a cipher) of the change that these characters feel coming, and a shift near the end of the movie suggests a loss that not only affects the world, but this time also music. …”
    Get full text
    Article
  9. 29

    Fixslicing AES-like Ciphers by Alexandre Adomnicai, Thomas Peyrin

    Published 2020-12-01
    “…The fixslicing implementation strategy was originally introduced as a new representation for the hardware-oriented GIFT block cipher to achieve very efficient software constant-time implementations. …”
    Get full text
    Article
  10. 30
  11. 31
  12. 32
  13. 33
  14. 34

    Analysis of iterated block ciphers by Wei, Lei

    Published 2012
    “…A block cipher is the foundation stone of symmetric-key cryptography. …”
    Get full text
    Thesis
  15. 35

    Analysis and design of authenticated ciphers by Huang, Tao

    Published 2016
    “…An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentiality, integrity and authenticity of the data. …”
    Get full text
    Thesis
  16. 36

    Physical attacks on block ciphers by Jap, Dirmanto

    Published 2016
    “…We first provide a theoretical fault attacks on LEA block cipher. Then, investigations and experiments are done to highlight the practicability of fault attacks, focusing on laser fault injections on smart cards.…”
    Get full text
    Thesis
  17. 37
  18. 38

    Parallel distributed compensation scheme for chaotic masking system via Rivest cipher 4 stream cipher by Feng‐Hsiag Hsiao

    Published 2023-07-01
    “…Abstract This study presents a design methodology for Takagi‐Sugeno (T‐S) fuzzy models‐based secure communications in multiple time‐delay chaotic (MTDC) systems with Rivest cipher 4 (RC4) algorithm. The main advantage of the RC4 algorithm is that the key length does not affect the encryption and decryption speeds. …”
    Get full text
    Article
  19. 39
  20. 40