Suchergebnisse - "Cryptanalysis of Block Ciphers and Hash Functions"
-
1
Autoren:
Quelle: Applicable Algebra in Engineering, Communication and Computing. 36:1033-1048
Schlagwörter: 0102 computer and information sciences, 02 engineering and technology, Puncturing, Computer science, 01 natural sciences, 7. Clean energy, Optical Code Division Multiple Access, Algorithm, Engineering, Cryptanalysis of Block Ciphers and Hash Functions, Artificial Intelligence, Computer Science, Physical Sciences, FOS: Electrical engineering, electronic engineering, information engineering, FOS: Mathematics, Telecommunications, 0202 electrical engineering, electronic engineering, information engineering, Electrical and Electronic Engineering, Mathematics, Cryptography and Error-Correcting Codes
-
2
Autoren: et al.
Quelle: AIMS Mathematics, Vol 9, Iss 5, Pp 10977-10996 (2024)
Schlagwörter: Image Encryption, Algebraic number, cartesian permutation, aes, Encryption, Set (abstract data type), 02 engineering and technology, 01 natural sciences, Mathematical analysis, Quantum mechanics, Biochemistry, Gene, Cryptanalysis of Block Ciphers and Hash Functions, s-boxes, Artificial Intelligence, Field (mathematics), QA1-939, FOS: Mathematics, 0101 mathematics, Cryptography and Error-Correcting Codes, Group (periodic table), klein four group $ {v}_{4} $, Chaos-based Image Encryption Techniques, Arithmetic, cartesian structure, $ {v}_{4}\times {v}_{4} $, Physics, Pure mathematics, Discrete mathematics, Affine transformation, Computer science, Programming language, Chemistry, Operating system, Computer Science, Physical Sciences, Transformation (genetics), Computer Vision and Pattern Recognition, 0210 nano-technology, Mathematics
-
3
Autoren: et al.
Quelle: Computational and Mathematical Methods, Vol 2023 (2023)
Schlagwörter: 0102 computer and information sciences, 02 engineering and technology, Separable space, 01 natural sciences, Mathematical analysis, Optical Code Division Multiple Access, Cryptanalysis of Block Ciphers and Hash Functions, Engineering, Theoretical computer science, Artificial Intelligence, Machine learning, QA1-939, 0202 electrical engineering, electronic engineering, information engineering, FOS: Electrical engineering, electronic engineering, information engineering, FOS: Mathematics, Electrical and Electronic Engineering, Cryptography and Error-Correcting Codes, Coding (social sciences), T57-57.97, Applied mathematics. Quantitative methods, Statistics, Discrete mathematics, 16. Peace & justice, Computer science, Algorithm, Decoding Algorithms, Genetic algorithm, Duality (order theory), Computer Science, Physical Sciences, Cryptography, Coding theory, Mathematics
Dateibeschreibung: text/xhtml
-
4
Autoren: et al.
Quelle: Proceedings of the 7th International Conference on Future Networks and Distributed Systems. :753-757
Schlagwörter: Software engineering, Chaos-based Image Encryption Techniques, Economics, Internet of Things, Health care, Encryption, Computer science, Lightweight Ciphers, 3. Good health, Cryptanalysis of Block Ciphers and Hash Functions, Hardware Security and Authentication Techniques, Artificial Intelligence, Hardware and Architecture, Computer security, Computer Science, Physical Sciences, Optical Encryption, Software deployment, Computer Vision and Pattern Recognition, Key (lock), Economic growth
-
5
Autoren:
Quelle: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 1 (2023)
Schlagwörter: Parallel computing, Computer engineering. Computer hardware, Shift-invariance, Transformer Network, Geometry, Jitter, Information technology, FOS: Health sciences, 7. Clean energy, TK7885-7895, Database, Cryptanalysis of Block Ciphers and Hash Functions, Engineering, Theoretical computer science, Artificial Intelligence, Computer engineering, Health Sciences, Side-Channel Attacks, FOS: Electrical engineering, electronic engineering, information engineering, FOS: Mathematics, Shuffling, Electrostatic Discharge Protection in Integrated Circuits, Electrical and Electronic Engineering, Scalability, Quadratic equation, SCA, T58.5-58.64, Computer science, Programming language, Algorithm, Infectious Diseases, Implementation, Computer Science, Physical Sciences, Methicillin-Resistant Staphylococcus aureus Infections, Telecommunications, Medicine, Mathematics
-
6
Autoren: et al.
Weitere Verfasser: et al.
Quelle: Proceedings on Privacy Enhancing Technologies, 2023 (1)
Schlagwörter: Secure Multi-party Computation, 0301 basic medicine, Conjunctive and disjunctive queries, Encryption, Cryptographic primitive, Cryptographic protocol, Search engine, Mathematical analysis, Searchable Encryption, Database, 03 medical and health sciences, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Artificial Intelligence, Boolean function, FOS: Mathematics, Information retrieval, Relational database, Authenticated Encryption, Attribute-Based Encryption, Cryptography and Error-Correcting Codes, Scheme (mathematics), Computer network, 0303 health sciences, Advanced Cryptographic Schemes and Protocols, Symmetric-key algorithm, Query by Example, Scalability, Boolean conjunctive query, Public-key cryptography, Computer science, Conjunctive query, Distributed computing, Boolean queries, Algorithm, Database encryption, Searchable encryption, Encrypted search, Computer Science, Physical Sciences, Cryptography, Web search query, Homomorphic Encryption, Mathematics
Dateibeschreibung: application/application/pdf
Zugangs-URL: http://hdl.handle.net/20.500.11850/568666
-
7
Autoren: et al.
Quelle: Elektronika ir Elektrotechnika, Vol 29, Iss 4, Pp 76-81 (2023)
Schlagwörter: Artificial intelligence, aes, Failure Analysis of Integrated Circuits, Convolutional neural network, Noise (video), Pattern recognition (psychology), Cryptanalysis of Block Ciphers and Hash Functions, Engineering, Artificial Intelligence, Computer engineering, Computer security, Side-Channel Attacks, FOS: Electrical engineering, electronic engineering, information engineering, Image (mathematics), Electrostatic Discharge Protection in Integrated Circuits, Electrical and Electronic Engineering, Key (lock), cnn, Deep learning, Side channel attack, Computer science, Profiling (computer programming), TK1-9971, Algorithm, Power analysis, Operating system, non-profile side-channel attack, Computer Science, Physical Sciences, Cryptography, Backside Analysis, Security Analysis, Electrical engineering. Electronics. Nuclear engineering
-
8
Autoren: et al.
Weitere Verfasser: et al.
Quelle: RUA. Repositorio Institucional de la Universidad de Alicante
Universidad de Alicante (UA)Schlagwörter: Lattice-based Cryptography, Neutron Radiation, Lightweight Ciphers, Searchable Encryption, Microprocessor, Cryptanalysis of Block Ciphers and Hash Functions, Engineering, Error Detection, Artificial Intelligence, Fault injection, FOS: Electrical engineering, electronic engineering, information engineering, Cryptography Algorithms, Soft error, [SPI.NANO]Engineering Sciences [physics]/Micro and nanotechnologies/Microelectronics, Electrical and Electronic Engineering, Embedded system, Advanced Cryptographic Schemes and Protocols, Electronic engineering, Low-power Microprocessor, Mode of Operation, Computer science, Algorithm, Overhead (engineering), Operating system, PACS 8542, Fault Tolerance in Electronic Systems, Computer Science, Physical Sciences, Cryptography, Soft Errors, Software
-
9
Autoren:
Quelle: Complex & Intelligent Systems, Vol 10, Iss 1, Pp 455-468 (2023)
Schlagwörter: FOS: Computer and information sciences, Image Encryption, Robustness (evolution), Encryption, Geometry, Interval-based Pythagorean fuzzy TOPSIS, Information technology, 02 engineering and technology, Operations research, Biochemistry, Gene, Detection and Prevention of Phishing Attacks, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Multi-criteria decision-making, Artificial Intelligence, Substitution box, FOS: Mathematics, 0202 electrical engineering, electronic engineering, information engineering, TOPSIS, Cipher, Block Ciphers, Block cipher, Pythagorean theorem, Chaos-based Image Encryption Techniques, 4. Education, QA75.5-76.95, T58.5-58.64, Computer science, Algorithm, Chemistry, Operating system, Color Image Encryption, Electronic computers. Computer science, Computer Science, Physical Sciences, Cryptography, Computer Vision and Pattern Recognition, Mathematics, Information Systems
-
10
Autoren: Ramy Taki Eldin
Quelle: Journal of Applied Mathematics and Computing. 69:3459-3487
Schlagwörter: 4. Education, Dual polyhedron, 0102 computer and information sciences, 02 engineering and technology, Discrete mathematics, 16. Peace & justice, 01 natural sciences, Algorithm, Cryptanalysis of Block Ciphers and Hash Functions, Computational Theory and Mathematics, Artificial Intelligence, Combinatorics, Computer Science, Physical Sciences, FOS: Mathematics, 0202 electrical engineering, electronic engineering, information engineering, Design and Simulation of Quantum-dot Cellular Automata, Error-Correcting Codes, Mathematics, Cryptography and Error-Correcting Codes
-
11
Autoren: et al.
Quelle: International Journal of Mathematical, Engineering and Management Sciences, Vol 8, Iss 2, Pp 230-244 (2023)
Schlagwörter: Technology, History, Encryption, 02 engineering and technology, serpent block cipher, Serpent (symbolism), Cryptanalysis, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Artificial Intelligence, Computer security, 0502 economics and business, QA1-939, 0202 electrical engineering, electronic engineering, information engineering, Key (lock), Cipher, chaotic equation, Block Ciphers, Block cipher, count tracking mechanism, Cryptography and Error-Correcting Codes, Key generation, Running key cipher, cyclic generator, Chaos-based Image Encryption Techniques, 05 social sciences, Differential Cryptanalysis, Computer science, Algorithm, Archaeology, Computer Science, Physical Sciences, Cryptography, Computer Vision and Pattern Recognition, s-box and permutation box, S-box, Mathematics
-
12
Autoren:
Quelle: Biometrics and Cryptography ISBN: 9781837682621
Schlagwörter: Image Encryption, Chaos-based Image Encryption Techniques, Encryption, Computer science, Lightweight Ciphers, Programming language, Algorithm, Operating system, Characterization and Detection of Android Malware, Cryptanalysis of Block Ciphers and Hash Functions, Color Image Encryption, Artificial Intelligence, Computer Science, Physical Sciences, Signal Processing, Optical Encryption, Cryptography, Computer Vision and Pattern Recognition, Cipher, Block Ciphers, Java
-
13
Autoren: et al.
Quelle: Multimed Tools Appl
Schlagwörter: Image Encryption, Artificial intelligence, Chaotic, Encryption, Geometry, Article, Cryptanalysis, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Compressive Sensing, Artificial Intelligence, Computer engineering, Computer security, FOS: Mathematics, Key (lock), Cryptosystem, Chaos-based Image Encryption Techniques, Arithmetic, Digital Image Watermarking Techniques, Computer science, Information Embedding, Quaternion, Algorithm, Operating system, Color Image Encryption, Computer Science, Physical Sciences, Cryptography, Computer Vision and Pattern Recognition, Mathematics
Zugangs-URL: https://pubmed.ncbi.nlm.nih.gov/37362649
-
14
Autoren: Gerardo Vega
Quelle: Designs, Codes and Cryptography. 91:2213-2221
Schlagwörter: FOS: Computer and information sciences, Sociology and Political Science, Computer Science - Information Theory, Symbol (formal), Social Sciences, 0102 computer and information sciences, 01 natural sciences, Mathematical analysis, Lightweight Ciphers, Cryptanalysis of Block Ciphers and Hash Functions, Artificial Intelligence, FOS: Mathematics, 0101 mathematics, Weight distribution, Cryptography and Error-Correcting Codes, Distribution (mathematics), Information Theory (cs.IT), Physics, Invariant (physics), Computer science, Programming language, Mathematical physics, Computer Science, Physical Sciences, Thermodynamics, Social Media Use and Impact on Society, Mathematics
Zugangs-URL: http://arxiv.org/abs/2206.03459
-
15
Autoren: et al.
Weitere Verfasser: et al.
Quelle: Cryptography and Communications. 17:311-335
Schlagwörter: Post-Quantum Signature Schemes, FOS: Computer and information sciences, Computer Science - Cryptography and Security, FOS: Physical sciences, 02 engineering and technology, 2010 MSC: 81P68, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, [PHYS.QPHY]Physics [physics]/Quantum Physics [quant-ph], NIST, Artificial Intelligence, Computer security, Cold Boot Attacks, Side-Channel Attacks, 0202 electrical engineering, electronic engineering, information engineering, Key (lock), Block Ciphers, Block cipher, Biology, [PHYS.QPHY] Physics [physics]/Quantum Physics [quant-ph], [INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR], Cryptography and Error-Correcting Codes, Quantum Physics, Grover's Quantum Algorithm, Chaos-based Image Encryption Techniques, Ecology, Natural language processing, Key Recovery, Computer science, Algorithm, Padding, FOS: Biological sciences, Computer Science, Physical Sciences, Picnic, Cryptography, Computer Vision and Pattern Recognition, Quantum Physics (quant-ph), 94A60, Key Enumeration, Cryptography and Security (cs.CR)
Dateibeschreibung: application/pdf
-
16
Autoren: et al.
Quelle: IEEE Access, Vol 11, Pp 29698-29710 (2023)
Schlagwörter: Image Encryption, History, Encryption, S-boxes, Serpent (symbolism), 7. Clean energy, Lightweight Ciphers, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Artificial Intelligence, Computer security, FOS: Mathematics, Authenticated Encryption, Key (lock), Block cipher, Cryptography and Error-Correcting Codes, power associative loop, Chaos-based Image Encryption Techniques, Statistics, Non-associativity, image encryption, Public-key cryptography, Computer science, TK1-9971, Key space, Algorithm, Color Image Encryption, Archaeology, Computer Science, Physical Sciences, Optical Encryption, Cryptography, Electrical engineering. Electronics. Nuclear engineering, Computer Vision and Pattern Recognition, Key size, Randomness, Mathematics
-
17
Autoren: et al.
Quelle: Intelligent Automation & Soft Computing. 36:1451-1463
Schlagwörter: Artificial intelligence, Quantum mechanics, Cryptanalysis, Cryptanalysis of Block Ciphers and Hash Functions, Hardware Security and Authentication Techniques, Selection (genetic algorithm), Theoretical computer science, Artificial Intelligence, FOS: Mathematics, Entropy (arrow of time), Data mining, Cryptosystem, Chaos-based Image Encryption Techniques, Physics, Mathematical optimization, 16. Peace & justice, Computer science, Multiple-criteria decision analysis, Algorithm, Color Image Encryption, Hardware and Architecture, Computer Science, Physical Sciences, Cryptography, Computer Vision and Pattern Recognition, Mathematics
-
18
Autoren: et al.
Quelle: AIMS Mathematics, Vol 8, Iss 9, Pp 21644-21667 (2023)
Schlagwörter: Galois theory, Component (thermodynamics), Encryption, security, QA299.6-433 Analysis, s-box, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Artificial Intelligence, QA1-939, FOS: Mathematics, nonlinear component, Cipher, Block Ciphers, Block cipher, Random oracle, Cryptography and Error-Correcting Codes, Computer network, Chaos-based Image Encryption Techniques, Physics, nonlinearity, block cipher, Finite field, Discrete mathematics, Public-key cryptography, Plaintext, Computer science, Algorithm, coset diagram, Computer Science, Physical Sciences, Cryptography, Thermodynamics, Computer Vision and Pattern Recognition, S-box, Mathematics, Coset
Dateibeschreibung: text
-
19
Autoren:
Quelle: IEEE Access, Vol 11, Pp 29101-29115 (2023)
Schlagwörter: Image Encryption, Artificial intelligence, Encryption, Image encryption, Lightweight Ciphers, Grayscale, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Artificial Intelligence, Computer security, Hashing, Image (mathematics), Cryptosystem, image cryptosystem, biological sequences, Chaos-based Image Encryption Techniques, Text Compression and Indexing Algorithms, DNA, Computer science, Lossless compression, TK1-9971, Scrambling, 3. Good health, DNA computing, Algorithm, Color Image Encryption, Data compression, Computer Science, Physical Sciences, Optical Encryption, Cryptography, Electrical engineering. Electronics. Nuclear engineering, Computer Vision and Pattern Recognition, Pixel, protein
-
20
Autoren: et al.
Quelle: IEEE Access, Vol 11, Pp 5483-5501 (2023)
Schlagwörter: Image Encryption, Encryption, 02 engineering and technology, Image encryption, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Artificial Intelligence, Computer engineering, Computer security, FOS: Mathematics, 0202 electrical engineering, electronic engineering, information engineering, Authenticated Encryption, Key (lock), Cryptography and Error-Correcting Codes, Chaos-based Image Encryption Techniques, Pure mathematics, Public-key cryptography, Computer science, Affine transformation, TK1-9971, affine power transformation, Elliptic curve cryptography, Algorithm, Color Image Encryption, Authentication (law), elliptic curve cryptography, Computer Science, Physical Sciences, Optical Encryption, Cryptography, Electrical engineering. Electronics. Nuclear engineering, Computer Vision and Pattern Recognition, S-box, Mathematics
Full Text Finder
Nájsť tento článok vo Web of Science