-
21
-
22
-
23
-
24
-
25
-
26
Cryptanalysis of HALFLOOP Block Ciphers
Published 2023-12-01“…Recently, it was shown in [DDLS22] that the smallest version of the cipher, HALFLOOP-24, can be attacked within a practical time and memory complexity. …”
Get full text
Article -
27
Fixslicing AES-like Ciphers
Published 2020-12-01“…The fixslicing implementation strategy was originally introduced as a new representation for the hardware-oriented GIFT block cipher to achieve very efficient software constant-time implementations. …”
Get full text
Article -
28
CIPHERS OF CHANGE: MUSIC AND APOCALYPSE
Published 2022-12-01“…Again, music appears as a figure (a cipher) of the change that these characters feel coming, and a shift near the end of the movie suggests a loss that not only affects the world, but this time also music. …”
Get full text
Article -
29
Fixslicing AES-like Ciphers
Published 2020-12-01“…The fixslicing implementation strategy was originally introduced as a new representation for the hardware-oriented GIFT block cipher to achieve very efficient software constant-time implementations. …”
Get full text
Article -
30
-
31
-
32
-
33
-
34
Analysis of iterated block ciphers
Published 2012“…A block cipher is the foundation stone of symmetric-key cryptography. …”
Get full text
Thesis -
35
Analysis and design of authenticated ciphers
Published 2016“…An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentiality, integrity and authenticity of the data. …”
Get full text
Thesis -
36
Physical attacks on block ciphers
Published 2016“…We first provide a theoretical fault attacks on LEA block cipher. Then, investigations and experiments are done to highlight the practicability of fault attacks, focusing on laser fault injections on smart cards.…”
Get full text
Thesis -
37
-
38
Parallel distributed compensation scheme for chaotic masking system via Rivest cipher 4 stream cipher
Published 2023-07-01“…Abstract This study presents a design methodology for Takagi‐Sugeno (T‐S) fuzzy models‐based secure communications in multiple time‐delay chaotic (MTDC) systems with Rivest cipher 4 (RC4) algorithm. The main advantage of the RC4 algorithm is that the key length does not affect the encryption and decryption speeds. …”
Get full text
Article -
39
Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers
Published 2023-06-01Subjects: “…Tweakable Block Cipher…”
Get full text
Article -
40
PixSel: Images as Book Cipher Keys. An Efficient Implementation Using Partial Homophonic Substitution Ciphers
Published 2018-05-01Subjects: “…book ciphers…”
Get full text
Article