-
101
Counter Mode Development for Block Cipher Operations
Published 2009-03-01Subjects: “…block cipher…”
Get full text
Article -
102
A SUGGESTED SUPER SALSA STREAM CIPHER
Published 2018-12-01Subjects: “…Stream cipher…”
Get full text
Article -
103
Fast block ciphers based on controlled permutations
Published 2001-02-01Subjects: Get full text
Article -
104
Kangaroo A Proposed Stream Cipher Algorithm
Published 2010-01-01Subjects: “…additive stream cipher…”
Get full text
Article -
105
-
106
BLOCK CIPHERS ON THE BASIS OF REVERSIBLE CELLULAR AUTOMATA
Published 2020-03-01Subjects: “…block cipher…”
Get full text
Article -
107
New cryptanalysis of the authenticated cipher model JAMBU
Published 2017-07-01Get full text
Article -
108
Secure and Efficient Diffusion Layers for Block Ciphers
Published 2017-10-01Subjects: “…Block Cipher…”
Get full text
Article -
109
TNT : how to tweak a block cipher
Published 2020“…In this paper, we propose Tweak-aNd-Tweak (𝖳𝖭𝖳 for short) mode, which builds a tweakable block cipher from three independent block ciphers. 𝖳𝖭𝖳 handles the tweak input by simply XOR-ing the unmodified tweak into the internal state of block ciphers twice. …”
Get full text
Conference Paper -
110
-
111
Performing fault attack on trivium stream cipher
Published 2017Get full text
Final Year Project (FYP) -
112
Analysis and Improvements of the Full Spritz Stream Cipher
Published 2017“…Spritz is a stream cipher proposed by Rivest and Schuldt at the rump session of CRYPTO 2014. …”
Get full text
Get full text
Journal Article -
113
Key-dependent s-box in lightweight block ciphers
Published 2014“…This paper introduces new methods of how to generate a suitable key-dependent substitution boxes (Sboxes) for use in lightweight block ciphers. An S-box is commonly used in block ciphers to provide the crucial property of nonlinearity. …”
Get full text
Get full text
Article -
114
-
115
A framework for describing block cipher cryptanalysis
Published 2006“…Block ciphers provide confidentiality by encrypting confidential messages into unintelligible form, which are irreversible without knowledge of the secret key used. …”
Get full text
Article -
116
The vulnerability analysis and the security evaluation of block ciphers
Published 2010Subjects: Get full text
Article -
117
A block cipher based on genetic algorithm
Published 2016“…The development of block ciphers have resulted in a number of cryptographic algorithms such as, AES, ARIA, BLOWFISH256, DESL, 3D-AES and many more. …”
Get full text
Thesis -
118
A new 128-bit block cipher
Published 2009“…Even though there have been so much development of the block cipher, the industry still requires another block cipher as long as security features are met. …”
Get full text
Thesis -
119
The Construction Of Quantum Block Cipher For Grover Algorithm
Published 2018“…Similarly to classical computing, to conduct a quantum attack on a classical block cipher, the block cipher must be designed and implemented as a quantum reversible circuit in a quantum platform.…”
Get full text
Thesis -
120