-
141
Automatic search algorithm for differential characteristics in ARX ciphers
Published 2016-05-01Subjects: “…block cipher…”
Get full text
Article -
142
Hardware Implementation of Artificial Neural Network for Data Ciphering
Published 2016-05-01Subjects: Get full text
Article -
143
Fault Attacks on the Authenticated Encryption Stream Cipher MORUS
Published 2018-01-01“…This paper investigates the application of fault attacks to the authenticated encryption stream cipher algorithm MORUS. We propose fault attacks on MORUS with two different goals: one to breach the confidentiality component, and the other to breach the integrity component. …”
Get full text
Article -
144
Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency
Published 2021-11-01“…This work introduces second-order masked implementation of LED, Midori, Skinny, and Prince ciphers which do not require fresh masks to be updated at every clock cycle. …”
Get full text
Article -
145
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers
Published 2017-03-01Subjects: Get full text
Article -
146
A Review of Block Cipher’s S-Boxes Tests Criteria
Published 2019-09-01Subjects: Get full text
Article -
147
Cryptanalysis of Polyalphabetic Cipher Using Differential Evolution Algorithm
Published 2020-01-01Subjects: Get full text
Article -
148
DPA Protected Implementation of OCB and COLM Authenticated Ciphers
Published 2019-01-01Subjects: “…Authenticated cipher…”
Get full text
Article -
149
Cubicle: A family of space‐hard ciphers for IoT
Published 2023-01-01“…Finally, the performance of Cubicle and other ciphers in some devices powered by ARM Cortex‐M3, ‐M4, and ‐M7 processors is evaluated. …”
Get full text
Article -
150
Cipher Modification Against Steganalysis Based on NIST Tests
Published 2019-04-01“…Part of our team proposed a new steganalytic method based on NIST tests at MMM-ACNS 2017 [1], and it was encouraged to investigate some cipher modifications to prevent such types of steganalysis. …”
Get full text
Article -
151
Masta: An HE-Friendly Cipher Using Modular Arithmetic
Published 2020-01-01Subjects: Get full text
Article -
152
Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers
Published 2018-05-01“…The trick is to use combined feedback to create a difference between the cipher text block and the rate part of the next feedback (in traditional sponge these two values are the same). …”
Get full text
Article -
153
Doctrine of the Ciphers Intercursions among Zeropoint-Utopia-Core
Published 2021-05-01“…The Blochian concept of cipher is discussed in some detail with a view to possible developments in the modern philosophy of nature. …”
Get full text
Article -
154
VHDL Implementation of Hybrid Block Cipher Method (SRC)
Published 2010-02-01“…This paper discusses the hardware design of the hybrid block cipher methodthat combines the RC6 cipher and the Serpent cipher.The block size is 128 bits, and the key can be any length up to 256 bytes. …”
Get full text
Article -
155
Algebraic Side Channel Attack on Trivium and Grain Ciphers
Published 2017-01-01Subjects: Get full text
Article -
156
Identification on the structures of block ciphers using machine learning
Published 2023-06-01Subjects: “…block ciphers…”
Get full text
Article -
157
Hardware Implementation of Artificial Neural Network for Data Ciphering
Published 2016-10-01Subjects: “…Back propagation, Ciphering, Encryption, FPGA, Neural Network, VHDL…”
Get full text
Article -
158
Cryptanalysis Knapsack Cipher Using Artificial Immune System
Published 2009-07-01Subjects: Get full text
Article -
159
Complete SAT based Cryptanalysis of RC5 Cipher
Published 2020-01-01Subjects: “…Symmetric ciphers…”
Get full text
Article -
160
Modern and Lightweight Component-based Symmetric Cipher Algorithms
Published 2022-12-01Subjects: “…Lightweight Symmetric Cipher…”
Get full text
Article