Search Results - Cryptanalysis of Block Ciphers AND Hash Functions
-
1
Authors: et al.
Source: IEEE Access, Vol 11, Pp 2138-2147 (2023)
Subject Terms: substitution-box, Construct (python library), Component (thermodynamics), Encryption, 02 engineering and technology, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Artificial Intelligence, FOS: Mathematics, 0202 electrical engineering, electronic engineering, information engineering, Block Ciphers, Block cipher, encryption, Cryptography and Error-Correcting Codes, Algebra over a field, Chaos-based Image Encryption Techniques, Arithmetic, Physics, Pure mathematics, Discrete mathematics, Computer science, Affine transformation, TK1-9971, Programming language, Algorithm, Operating system, Notation, Combinatorics, block ciphers, Gravesian octonion integers, Computer Science, Physical Sciences, Security, Cryptography, Thermodynamics, Electrical engineering. Electronics. Nuclear engineering, Computer Vision and Pattern Recognition, S-box, Mathematics, Block (permutation group theory)
-
2
Authors: et al.
Contributors: et al.
Source: Cryptography and Communications. 17:311-335
Subject Terms: Post-Quantum Signature Schemes, FOS: Computer and information sciences, Computer Science - Cryptography and Security, FOS: Physical sciences, 02 engineering and technology, 2010 MSC: 81P68, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, [PHYS.QPHY]Physics [physics]/Quantum Physics [quant-ph], NIST, Artificial Intelligence, Computer security, Cold Boot Attacks, Side-Channel Attacks, 0202 electrical engineering, electronic engineering, information engineering, Key (lock), Block Ciphers, Block cipher, Biology, [PHYS.QPHY] Physics [physics]/Quantum Physics [quant-ph], [INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR], Cryptography and Error-Correcting Codes, Quantum Physics, Grover's Quantum Algorithm, Chaos-based Image Encryption Techniques, Ecology, Natural language processing, Key Recovery, Computer science, Algorithm, Padding, FOS: Biological sciences, Computer Science, Physical Sciences, Picnic, Cryptography, Computer Vision and Pattern Recognition, Quantum Physics (quant-ph), 94A60, Key Enumeration, Cryptography and Security (cs.CR)
File Description: application/pdf
-
3
Authors: et al.
Source: AIMS Mathematics, Vol 8, Iss 9, Pp 21644-21667 (2023)
Subject Terms: Galois theory, Component (thermodynamics), Encryption, security, QA299.6-433 Analysis, s-box, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Artificial Intelligence, QA1-939, FOS: Mathematics, nonlinear component, Cipher, Block Ciphers, Block cipher, Random oracle, Cryptography and Error-Correcting Codes, Computer network, Chaos-based Image Encryption Techniques, Physics, nonlinearity, block cipher, Finite field, Discrete mathematics, Public-key cryptography, Plaintext, Computer science, Algorithm, coset diagram, Computer Science, Physical Sciences, Cryptography, Thermodynamics, Computer Vision and Pattern Recognition, S-box, Mathematics, Coset
File Description: text
-
4
Authors:
Source: Complex & Intelligent Systems, Vol 10, Iss 1, Pp 455-468 (2023)
Subject Terms: FOS: Computer and information sciences, Image Encryption, Robustness (evolution), Encryption, Geometry, Interval-based Pythagorean fuzzy TOPSIS, Information technology, 02 engineering and technology, Operations research, Biochemistry, Gene, Detection and Prevention of Phishing Attacks, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Multi-criteria decision-making, Artificial Intelligence, Substitution box, FOS: Mathematics, 0202 electrical engineering, electronic engineering, information engineering, TOPSIS, Cipher, Block Ciphers, Block cipher, Pythagorean theorem, Chaos-based Image Encryption Techniques, 4. Education, QA75.5-76.95, T58.5-58.64, Computer science, Algorithm, Chemistry, Operating system, Color Image Encryption, Electronic computers. Computer science, Computer Science, Physical Sciences, Cryptography, Computer Vision and Pattern Recognition, Mathematics, Information Systems
-
5
Authors: Roayat Ismail Abdelfatah
Source: IEEE Access, Vol 10, Pp 107152-107169 (2022)
Subject Terms: Image Encryption, Quantum Computation, Encryption, Quantum mechanics, 01 natural sciences, Quantum, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Artificial Intelligence, Computer security, Quantum encryption, Quantum Computing and Simulation, Quantum computer, 0502 economics and business, 0103 physical sciences, FOS: Mathematics, image, security analysis, Fault-tolerant Quantum Computation, Computer network, Chaos-based Image Encryption Techniques, Quantum gate, Physics, 05 social sciences, pseudo random generator, Plaintext, Computer science, TK1-9971, Algorithm, Controlled NOT gate, Color Image Encryption, Quantum Simulation, Computer Science, Physical Sciences, Hash function, Pseudorandom number generator, brute force attack, Electrical engineering. Electronics. Nuclear engineering, Computer Vision and Pattern Recognition, chosen plaintext attack, Mathematics
-
6
Authors: et al.
Source: IEEE Access, Vol 9, Pp 134052-134064 (2021)
Subject Terms: Artificial intelligence, CBC-MAC, Encryption, 02 engineering and technology, Lightweight Ciphers, Cryptanalysis of Block Ciphers and Hash Functions, Characterization and Detection of Android Malware, cryptanalysis, Artificial Intelligence, Computer security, Machine learning, 0202 electrical engineering, electronic engineering, information engineering, Block size, Cipher, Key (lock), Block Ciphers, Block cipher, Cryptography and Error-Correcting Codes, block cipher, Active S-boxes, Computer science, TK1-9971, Algorithm, machine learning, lightweight cryptography, Computer Science, Physical Sciences, Signal Processing, Cryptography, Security Analysis, Electrical engineering. Electronics. Nuclear engineering, differential cryptanalysis
-
7
Authors:
Source: Cybersecurity, Vol 6, Iss 1, Pp 1-13 (2023)
Subject Terms: Computer engineering. Computer hardware, Artificial intelligence, CBC-MAC, Tamper-resilient cryptography, Geometry, Set (abstract data type), 0102 computer and information sciences, 02 engineering and technology, Split-state model, 01 natural sciences, TK7885-7895, Cryptanalysis of Block Ciphers and Hash Functions, Characterization and Detection of Android Malware, Theoretical computer science, Adversary, Artificial Intelligence, Computer security, Code word, 0202 electrical engineering, electronic engineering, information engineering, FOS: Mathematics, Encoding (memory), Block Ciphers, Block cipher, Code (set theory), Chaos-based Image Encryption Techniques, Concrete security, QA75.5-76.95, Computer science, Programming language, Algorithm, Color Image Encryption, Electronic computers. Computer science, Computer Science, Physical Sciences, Signal Processing, Non-malleable code, Cryptography, Computer Vision and Pattern Recognition, Decoding methods, Block (permutation group theory), Mathematics
-
8
Authors: et al.
Source: IEEE Access, Vol 8, Pp 203747-203757 (2020)
Aboushosha, B, Ramadan, R A, Dwivedi, A D, El-Sayed, A & Dessouky, M M 2020, 'SLIM : A lightweight block cipher for internet of health things', IEEE Access, vol. 8, pp. 203747-203757. https://doi.org/10.1109/ACCESS.2020.3036589
Aboushosha, B, Ramadan, R A, Dwivedi, A D, El-Sayed, A & Dessouky, M M 2021, ' SLIM: A Lightweight Block Cipher for Internet of Health Things ', IEEE Access, vol. 8, pp. 203747-203757 . https://doi.org/10.1109/ACCESS.2020.3036589Subject Terms: feistel ciphers, Encryption, 02 engineering and technology, Lightweight Ciphers, Cryptanalysis, Cryptanalysis of Block Ciphers and Hash Functions, Hardware Security and Authentication Techniques, cryptanalysis, Artificial Intelligence, Computer security, Triple DES, 0202 electrical engineering, electronic engineering, information engineering, Lightweight cryptography, Authenticated Encryption, Feistel ciphers, Cipher, Embedded system, Block Ciphers, Block cipher, Cryptography and Error-Correcting Codes, RFID, Computer network, Computer science, TK1-9971, Hardware and Architecture, Block ciphers, block ciphers, lightweight cryptography, Computer Science, Physical Sciences, Cryptography, Electrical engineering. Electronics. Nuclear engineering, Logic Encryption
File Description: application/pdf
Access URL: https://ieeexplore.ieee.org/ielx7/6287639/6514899/09250428.pdf
https://doaj.org/article/093c119277c74e5da9d96c4a58d89fec
https://vbn.aau.dk/da/publications/a16f7ccf-2365-4709-ae32-84ea2a0f5743
https://doi.org/10.1109/ACCESS.2020.3036589
http://www.scopus.com/inward/record.url?scp=85101875584&partnerID=8YFLogxK
https://dblp.uni-trier.de/db/journals/access/access8.html#AboushoshaRDED20
https://ieeexplore.ieee.org/document/9250428
https://orbit.dtu.dk/en/publications/slim-a-lightweight-block -cipher -for-internet-of-health-things
https://backend.orbit.dtu.dk/ws/files/234770717/09250428.pdf
https://doaj.org/article/093c119277c74e5da9d96c4a58d89fec
https://orbit.dtu.dk/en/publications/92c3bbde-5b18-461d-a797-046313e7cda7 -
9
Authors: et al.
Source: Heliyon, Vol 9, Iss 4, Pp e15257-(2023)
Subject Terms: Science (General), Lightweight Ciphers, Cryptanalysis, Q1-390, Cryptanalysis of Block Ciphers and Hash Functions, Hardware Security and Authentication Techniques, Theoretical computer science, Artificial Intelligence, Computer security, FOS: Mathematics, Linear cryptanalysis, Key (lock), Block Ciphers, Block cipher, H1-99, Key schedule, Chaos-based Image Encryption Techniques, Arithmetic, Physics, LCB, Impossible differential cryptanalysis, Differential Cryptanalysis, Differential cryptanalysis, Computer science, Lightweight block cipher, Social sciences (General), Algorithm, LBC-IoT, Hardware and Architecture, Higher-order differential cryptanalysis, SCENERY, Computer Science, Physical Sciences, Cryptography, Security Analysis, Thermodynamics, Computer Vision and Pattern Recognition, Differential (mechanical device), SLIM, Boomerang attack, Mathematics
-
10
Authors: et al.
Source: IEEE Access, Vol 8, Pp 207610-207618 (2020)
Subject Terms: Image Encryption, Lightweight Ciphers, Secure Hash Algorithm, Cryptanalysis of Block Ciphers and Hash Functions, Artificial Intelligence, Computer security, Embedded system, FPGA, Cryptography and Error-Correcting Codes, Hash Functions, low power, PHOTON Hash function, Chaos-based Image Encryption Techniques, SHA-2, Computer hardware, sponge construction, Hardware Implementations, Computer science, Throughput, TK1-9971, Field-programmable gate array, Cryptographic hash function, Algorithm, Operating system, lightweight cryptography, Computer Science, Physical Sciences, Hash function, Optical Encryption, Cryptography, Wireless, hardware security, Electrical engineering. Electronics. Nuclear engineering, Computer Vision and Pattern Recognition
-
11
Authors:
Source: Biometrics and Cryptography ISBN: 9781837682621
Subject Terms: Image Encryption, Chaos-based Image Encryption Techniques, Encryption, Computer science, Lightweight Ciphers, Programming language, Algorithm, Operating system, Characterization and Detection of Android Malware, Cryptanalysis of Block Ciphers and Hash Functions, Color Image Encryption, Artificial Intelligence, Computer Science, Physical Sciences, Signal Processing, Optical Encryption, Cryptography, Computer Vision and Pattern Recognition, Cipher, Block Ciphers, Java
-
12
Authors:
Source: Journal of Computer Science. 16:1639-1647
Subject Terms: Encryption, 02 engineering and technology, Random number generation, Lightweight Ciphers, Cryptanalysis, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, NIST, Artificial Intelligence, Computer engineering, Computer security, FOS: Mathematics, 0202 electrical engineering, electronic engineering, information engineering, Key (lock), Cipher, Block cipher, Randomness tests, Chaos-based Image Encryption Techniques, Natural language processing, Statistics, Random Number Generator, Stream cipher, Plaintext, Computer science, 3. Good health, Algorithm, Computer Science, Physical Sciences, Cryptography, Security Analysis, Computer Vision and Pattern Recognition, Randomness, Mathematics
-
13
Authors: et al.
Source: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 2 (2020)
Subject Terms: Computer engineering. Computer hardware, AES implementations, Fault Attacks, Compiler, Encryption, Differential Fault Attacks, Information technology, 02 engineering and technology, TK7885-7895, Cryptanalysis, Characterization and Detection of Android Malware, Cryptanalysis of Block Ciphers and Hash Functions, Artificial Intelligence, Computer engineering, Computer security, Security Aware Compilers, Fault injection, 0202 electrical engineering, electronic engineering, information engineering, Cache Attacks, Cipher, Embedded system, Block Ciphers, Block cipher, Language-based Information Flow Security, Automatic Fault Attack Evaluation, Software engineering, T58.5-58.64, Computer science, Algorithm, Advanced Encryption Standard, Operating system, Implementation, Signal Processing, Computer Science, Physical Sciences, Cryptography, Security Analysis, Software
-
14
Authors:
Source: IEEE Access, Vol 8, Pp 80395-80407 (2020)
Subject Terms: Image Encryption, MDC-2, Hash tree, T58.5-58.64 Information technology, message digest authentication, Mersenne number transform, 02 engineering and technology, Rolling hash, Cryptanalysis of Block Ciphers and Hash Functions, Characterization and Detection of Android Malware, Theoretical computer science, Compressive Sensing, Double hashing, Artificial Intelligence, Computer security, Collision attack, 0202 electrical engineering, electronic engineering, information engineering, Hash Functions, Chaos-based Image Encryption Techniques, Hash chain, SHA-2, Collision resistance, Computer science, TK1-9971, Cryptographic hash function, Algorithm, Color Image Encryption, Computer Science, Physical Sciences, Signal Processing, Hash function, Electrical engineering. Electronics. Nuclear engineering, Computer Vision and Pattern Recognition, SWIFFT
File Description: application/pdf
-
15
Authors:
Source: Cybersecurity, Vol 6, Iss 1, Pp 1-19 (2023)
Subject Terms: IoT, Computer engineering. Computer hardware, Encryption, 02 engineering and technology, 7. Clean energy, Lightweight Ciphers, FELICS, TK7885-7895, Cryptanalysis of Block Ciphers and Hash Functions, Avalanche effects, Artificial Intelligence, Triple DES, Computer security, 0202 electrical engineering, electronic engineering, information engineering, Cipher, Embedded system, Block Ciphers, Block cipher, Cryptography and Error-Correcting Codes, Running key cipher, Chaos-based Image Encryption Techniques, Stream cipher, Edge computing, QA75.5-76.95, Butterfly architecture, Computer science, Block ciphers, Electronic computers. Computer science, Computer Science, Physical Sciences, Cryptography, Computer Vision and Pattern Recognition
-
16
Authors: et al.
Source: IEEE Access, Vol 8, Pp 123492-123506 (2020)
Subject Terms: non-associativity, 02 engineering and technology, S-boxes, Image encryption, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Artificial Intelligence, FOS: Mathematics, 0202 electrical engineering, electronic engineering, information engineering, Algebraic structure, Block Ciphers, Block cipher, Cryptosystem, Cryptography and Error-Correcting Codes, power associative loop, Chaos-based Image Encryption Techniques, Pure mathematics, Substitution (logic), Computer science, TK1-9971, Programming language, Algorithm, Combinatorics, Computer Science, Physical Sciences, Cryptography, Electrical engineering. Electronics. Nuclear engineering, Computer Vision and Pattern Recognition, Block (permutation group theory), Mathematics
File Description: application/pdf
-
17
Authors: et al.
Source: IACR Transactions on Symmetric Cryptology, Vol 2018, Iss 3 (2018)
IACR Transactions on Symmetric Cryptology; Volume 2018, Issue 3; 36-92Subject Terms: Computer engineering. Computer hardware, MDC-2, Encryption, Epistemology, 0102 computer and information sciences, 02 engineering and technology, 01 natural sciences, Searchable Encryption, TK7885-7895, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Engineering, Double hashing, Beyond Birthday, Artificial Intelligence, Computer security, FOS: Mathematics, 0202 electrical engineering, electronic engineering, information engineering, Cover-free, Attribute-Based Encryption, Control system, Block Ciphers, Block cipher, Block-wise Universal, Cryptography and Error-Correcting Codes, Hash Functions, PMAC, Computer network, Advanced Cryptographic Schemes and Protocols, Hash chain, SHA-2, Computer science, FOS: Philosophy, ethics and religion, Cryptographic hash function, Algorithm, Philosophy, Sum of PRP, Combinatorics, Electrical engineering, Computer Science, Physical Sciences, Hash function, Cryptography, Simple (philosophy), DbHtS, Homomorphic Encryption, Block (permutation group theory), Mathematics, PRF
File Description: application/pdf
-
18
Authors:
Source: PLoS One
PLoS ONE, Vol 19, Iss 6, p e0304873 (2024)Subject Terms: Parallel computing, Science, Optical Code Division Multiple Access, Database, Cryptanalysis of Block Ciphers and Hash Functions, Engineering, Artificial Intelligence, Computer security, FOS: Electrical engineering, electronic engineering, information engineering, FOS: Mathematics, Block size, Electrical and Electronic Engineering, Key (lock), Block Ciphers, Block cipher, Cryptography and Error-Correcting Codes, Arithmetic, Lookup table, Computer science, Programming language, Algorithm, Computer Science, Physical Sciences, Cryptography, Medicine, Storage efficiency, Software, Algorithms, Mathematics, Research Article
-
19
Authors: et al.
Source: IACR Transactions on Symmetric Cryptology, Vol 2025, Iss 3 (2025)
Subject Terms: Block Cipher, AES, AES Instructions, Cryptographic Implementations, Cryptanalysis, Computer engineering. Computer hardware, TK7885-7895
File Description: electronic resource
-
20
Authors:
Source: Applicable Algebra in Engineering, Communication and Computing. 36:1033-1048
Subject Terms: 0102 computer and information sciences, 02 engineering and technology, Puncturing, Computer science, 01 natural sciences, 7. Clean energy, Optical Code Division Multiple Access, Algorithm, Engineering, Cryptanalysis of Block Ciphers and Hash Functions, Artificial Intelligence, Computer Science, Physical Sciences, FOS: Electrical engineering, electronic engineering, information engineering, FOS: Mathematics, Telecommunications, 0202 electrical engineering, electronic engineering, information engineering, Electrical and Electronic Engineering, Mathematics, Cryptography and Error-Correcting Codes
Full Text Finder
Nájsť tento článok vo Web of Science