Výsledky vyhledávání - Cryptanalysis of Block Ciphers and Hash Functions*
-
1
Autoři: a další
Zdroj: IEEE Access, Vol 11, Pp 2138-2147 (2023)
Témata: substitution-box, Construct (python library), Component (thermodynamics), Encryption, 02 engineering and technology, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Artificial Intelligence, FOS: Mathematics, 0202 electrical engineering, electronic engineering, information engineering, Block Ciphers, Block cipher, encryption, Cryptography and Error-Correcting Codes, Algebra over a field, Chaos-based Image Encryption Techniques, Arithmetic, Physics, Pure mathematics, Discrete mathematics, Computer science, Affine transformation, TK1-9971, Programming language, Algorithm, Operating system, Notation, Combinatorics, block ciphers, Gravesian octonion integers, Computer Science, Physical Sciences, Security, Cryptography, Thermodynamics, Electrical engineering. Electronics. Nuclear engineering, Computer Vision and Pattern Recognition, S-box, Mathematics, Block (permutation group theory)
Přístupová URL adresa: https://doaj.org/article/a774d34731be4e5796b7c154c9d20735
-
2
Autoři: a další
Přispěvatelé: a další
Zdroj: Cryptography and Communications. 17:311-335
Témata: Post-Quantum Signature Schemes, FOS: Computer and information sciences, Computer Science - Cryptography and Security, FOS: Physical sciences, 02 engineering and technology, 2010 MSC: 81P68, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, [PHYS.QPHY]Physics [physics]/Quantum Physics [quant-ph], NIST, Artificial Intelligence, Computer security, Cold Boot Attacks, Side-Channel Attacks, 0202 electrical engineering, electronic engineering, information engineering, Key (lock), Block Ciphers, Block cipher, Biology, [PHYS.QPHY] Physics [physics]/Quantum Physics [quant-ph], [INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR], Cryptography and Error-Correcting Codes, Quantum Physics, Grover's Quantum Algorithm, Chaos-based Image Encryption Techniques, Ecology, Natural language processing, Key Recovery, Computer science, Algorithm, Padding, FOS: Biological sciences, Computer Science, Physical Sciences, Picnic, Cryptography, Computer Vision and Pattern Recognition, Quantum Physics (quant-ph), 94A60, Key Enumeration, Cryptography and Security (cs.CR)
Popis souboru: application/pdf
-
3
Autoři: a další
Zdroj: AIMS Mathematics, Vol 8, Iss 9, Pp 21644-21667 (2023)
Témata: Galois theory, Component (thermodynamics), Encryption, security, QA299.6-433 Analysis, s-box, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Artificial Intelligence, QA1-939, FOS: Mathematics, nonlinear component, Cipher, Block Ciphers, Block cipher, Random oracle, Cryptography and Error-Correcting Codes, Computer network, Chaos-based Image Encryption Techniques, Physics, nonlinearity, block cipher, Finite field, Discrete mathematics, Public-key cryptography, Plaintext, Computer science, Algorithm, coset diagram, Computer Science, Physical Sciences, Cryptography, Thermodynamics, Computer Vision and Pattern Recognition, S-box, Mathematics, Coset
Popis souboru: text
Přístupová URL adresa: https://doaj.org/article/b5be8b53cd2c4dcbac553fae5ba23268
-
4
Autoři: a další
Zdroj: IEEE Access, Vol 9, Pp 134052-134064 (2021)
Témata: Artificial intelligence, CBC-MAC, Encryption, 02 engineering and technology, Lightweight Ciphers, Cryptanalysis of Block Ciphers and Hash Functions, Characterization and Detection of Android Malware, cryptanalysis, Artificial Intelligence, Computer security, Machine learning, 0202 electrical engineering, electronic engineering, information engineering, Block size, Cipher, Key (lock), Block Ciphers, Block cipher, Cryptography and Error-Correcting Codes, block cipher, Active S-boxes, Computer science, TK1-9971, Algorithm, machine learning, lightweight cryptography, Computer Science, Physical Sciences, Signal Processing, Cryptography, Security Analysis, Electrical engineering. Electronics. Nuclear engineering, differential cryptanalysis
-
5
Autoři:
Zdroj: Cybersecurity, Vol 6, Iss 1, Pp 1-13 (2023)
Témata: Computer engineering. Computer hardware, Artificial intelligence, CBC-MAC, Tamper-resilient cryptography, Geometry, Set (abstract data type), 0102 computer and information sciences, 02 engineering and technology, Split-state model, 01 natural sciences, TK7885-7895, Cryptanalysis of Block Ciphers and Hash Functions, Characterization and Detection of Android Malware, Theoretical computer science, Adversary, Artificial Intelligence, Computer security, Code word, 0202 electrical engineering, electronic engineering, information engineering, FOS: Mathematics, Encoding (memory), Block Ciphers, Block cipher, Code (set theory), Chaos-based Image Encryption Techniques, Concrete security, QA75.5-76.95, Computer science, Programming language, Algorithm, Color Image Encryption, Electronic computers. Computer science, Computer Science, Physical Sciences, Signal Processing, Non-malleable code, Cryptography, Computer Vision and Pattern Recognition, Decoding methods, Block (permutation group theory), Mathematics
Přístupová URL adresa: https://doaj.org/article/eaa7b35410c2451ba4a86474a8a38e48
-
6
Autoři: a další
Zdroj: IEEE Access, Vol 8, Pp 203747-203757 (2020)
Aboushosha, B, Ramadan, R A, Dwivedi, A D, El-Sayed, A & Dessouky, M M 2020, 'SLIM : A lightweight block cipher for internet of health things', IEEE Access, vol. 8, pp. 203747-203757. https://doi.org/10.1109/ACCESS.2020.3036589
Aboushosha, B, Ramadan, R A, Dwivedi, A D, El-Sayed, A & Dessouky, M M 2021, ' SLIM: A Lightweight Block Cipher for Internet of Health Things ', IEEE Access, vol. 8, pp. 203747-203757 . https://doi.org/10.1109/ACCESS.2020.3036589Témata: feistel ciphers, Encryption, 02 engineering and technology, Lightweight Ciphers, Cryptanalysis, Cryptanalysis of Block Ciphers and Hash Functions, Hardware Security and Authentication Techniques, cryptanalysis, Artificial Intelligence, Computer security, Triple DES, 0202 electrical engineering, electronic engineering, information engineering, Lightweight cryptography, Authenticated Encryption, Feistel ciphers, Cipher, Embedded system, Block Ciphers, Block cipher, Cryptography and Error-Correcting Codes, RFID, Computer network, Computer science, TK1-9971, Hardware and Architecture, Block ciphers, block ciphers, lightweight cryptography, Computer Science, Physical Sciences, Cryptography, Electrical engineering. Electronics. Nuclear engineering, Logic Encryption
Popis souboru: application/pdf
Přístupová URL adresa: https://ieeexplore.ieee.org/ielx7/6287639/6514899/09250428.pdf
https://doaj.org/article/093c119277c74e5da9d96c4a58d89fec
https://vbn.aau.dk/da/publications/a16f7ccf-2365-4709-ae32-84ea2a0f5743
https://doi.org/10.1109/ACCESS.2020.3036589
http://www.scopus.com/inward/record.url?scp=85101875584&partnerID=8YFLogxK
https://dblp.uni-trier.de/db/journals/access/access8.html#AboushoshaRDED20
https://ieeexplore.ieee.org/document/9250428
https://orbit.dtu.dk/en/publications/slim-a-lightweight-block -cipher -for-internet-of-health-things
https://backend.orbit.dtu.dk/ws/files/234770717/09250428.pdf
https://doaj.org/article/093c119277c74e5da9d96c4a58d89fec
https://orbit.dtu.dk/en/publications/92c3bbde-5b18-461d-a797-046313e7cda7 -
7
Autoři: a další
Zdroj: Heliyon, Vol 9, Iss 4, Pp e15257-(2023)
Témata: Science (General), Lightweight Ciphers, Cryptanalysis, Q1-390, Cryptanalysis of Block Ciphers and Hash Functions, Hardware Security and Authentication Techniques, Theoretical computer science, Artificial Intelligence, Computer security, FOS: Mathematics, Linear cryptanalysis, Key (lock), Block Ciphers, Block cipher, H1-99, Key schedule, Chaos-based Image Encryption Techniques, Arithmetic, Physics, LCB, Impossible differential cryptanalysis, Differential Cryptanalysis, Differential cryptanalysis, Computer science, Lightweight block cipher, Social sciences (General), Algorithm, LBC-IoT, Hardware and Architecture, Higher-order differential cryptanalysis, SCENERY, Computer Science, Physical Sciences, Cryptography, Security Analysis, Thermodynamics, Computer Vision and Pattern Recognition, Differential (mechanical device), SLIM, Boomerang attack, Mathematics
-
8
Autoři:
Zdroj: Biometrics and Cryptography ISBN: 9781837682621
Témata: Image Encryption, Chaos-based Image Encryption Techniques, Encryption, Computer science, Lightweight Ciphers, Programming language, Algorithm, Operating system, Characterization and Detection of Android Malware, Cryptanalysis of Block Ciphers and Hash Functions, Color Image Encryption, Artificial Intelligence, Computer Science, Physical Sciences, Signal Processing, Optical Encryption, Cryptography, Computer Vision and Pattern Recognition, Cipher, Block Ciphers, Java
-
9
Autoři:
Zdroj: Journal of Computer Science. 16:1639-1647
Témata: Encryption, 02 engineering and technology, Random number generation, Lightweight Ciphers, Cryptanalysis, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, NIST, Artificial Intelligence, Computer engineering, Computer security, FOS: Mathematics, 0202 electrical engineering, electronic engineering, information engineering, Key (lock), Cipher, Block cipher, Randomness tests, Chaos-based Image Encryption Techniques, Natural language processing, Statistics, Random Number Generator, Stream cipher, Plaintext, Computer science, 3. Good health, Algorithm, Computer Science, Physical Sciences, Cryptography, Security Analysis, Computer Vision and Pattern Recognition, Randomness, Mathematics
-
10
Autoři: a další
Zdroj: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 2 (2020)
Témata: Computer engineering. Computer hardware, AES implementations, Fault Attacks, Compiler, Encryption, Differential Fault Attacks, Information technology, 02 engineering and technology, TK7885-7895, Cryptanalysis, Characterization and Detection of Android Malware, Cryptanalysis of Block Ciphers and Hash Functions, Artificial Intelligence, Computer engineering, Computer security, Security Aware Compilers, Fault injection, 0202 electrical engineering, electronic engineering, information engineering, Cache Attacks, Cipher, Embedded system, Block Ciphers, Block cipher, Language-based Information Flow Security, Automatic Fault Attack Evaluation, Software engineering, T58.5-58.64, Computer science, Algorithm, Advanced Encryption Standard, Operating system, Implementation, Signal Processing, Computer Science, Physical Sciences, Cryptography, Security Analysis, Software
-
11
Autoři:
Zdroj: Cybersecurity, Vol 6, Iss 1, Pp 1-19 (2023)
Témata: IoT, Computer engineering. Computer hardware, Encryption, 02 engineering and technology, 7. Clean energy, Lightweight Ciphers, FELICS, TK7885-7895, Cryptanalysis of Block Ciphers and Hash Functions, Avalanche effects, Artificial Intelligence, Triple DES, Computer security, 0202 electrical engineering, electronic engineering, information engineering, Cipher, Embedded system, Block Ciphers, Block cipher, Cryptography and Error-Correcting Codes, Running key cipher, Chaos-based Image Encryption Techniques, Stream cipher, Edge computing, QA75.5-76.95, Butterfly architecture, Computer science, Block ciphers, Electronic computers. Computer science, Computer Science, Physical Sciences, Cryptography, Computer Vision and Pattern Recognition
Přístupová URL adresa: https://doaj.org/article/cb92e781d9b449ac82874ef8b99b69d7
-
12
Autoři: a další
Zdroj: IEEE Access, Vol 8, Pp 123492-123506 (2020)
Témata: non-associativity, 02 engineering and technology, S-boxes, Image encryption, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Artificial Intelligence, FOS: Mathematics, 0202 electrical engineering, electronic engineering, information engineering, Algebraic structure, Block Ciphers, Block cipher, Cryptosystem, Cryptography and Error-Correcting Codes, power associative loop, Chaos-based Image Encryption Techniques, Pure mathematics, Substitution (logic), Computer science, TK1-9971, Programming language, Algorithm, Combinatorics, Computer Science, Physical Sciences, Cryptography, Electrical engineering. Electronics. Nuclear engineering, Computer Vision and Pattern Recognition, Block (permutation group theory), Mathematics
Popis souboru: application/pdf
-
13
Autoři:
Zdroj: PLoS One
PLoS ONE, Vol 19, Iss 6, p e0304873 (2024)Témata: Parallel computing, Science, Optical Code Division Multiple Access, Database, Cryptanalysis of Block Ciphers and Hash Functions, Engineering, Artificial Intelligence, Computer security, FOS: Electrical engineering, electronic engineering, information engineering, FOS: Mathematics, Block size, Electrical and Electronic Engineering, Key (lock), Block Ciphers, Block cipher, Cryptography and Error-Correcting Codes, Arithmetic, Lookup table, Computer science, Programming language, Algorithm, Computer Science, Physical Sciences, Cryptography, Medicine, Storage efficiency, Software, Algorithms, Mathematics, Research Article
-
14
Autoři: a další
Zdroj: IACR Transactions on Symmetric Cryptology, Vol 2025, Iss 3 (2025)
Témata: Block Cipher, AES, AES Instructions, Cryptographic Implementations, Cryptanalysis, Computer engineering. Computer hardware, TK7885-7895
Popis souboru: electronic resource
Přístupová URL adresa: https://doaj.org/article/2e8ccc79f3554baf8d3d14a70e6bced5
-
15
Autoři:
Zdroj: Applicable Algebra in Engineering, Communication and Computing. 36:1033-1048
Témata: 0102 computer and information sciences, 02 engineering and technology, Puncturing, Computer science, 01 natural sciences, 7. Clean energy, Optical Code Division Multiple Access, Algorithm, Engineering, Cryptanalysis of Block Ciphers and Hash Functions, Artificial Intelligence, Computer Science, Physical Sciences, FOS: Electrical engineering, electronic engineering, information engineering, FOS: Mathematics, Telecommunications, 0202 electrical engineering, electronic engineering, information engineering, Electrical and Electronic Engineering, Mathematics, Cryptography and Error-Correcting Codes
-
16
Autoři: a další
Zdroj: IACR Transactions on Symmetric Cryptology, Vol 2018, Iss 3 (2018)
IACR Transactions on Symmetric Cryptology; Volume 2018, Issue 3; 36-92Témata: Computer engineering. Computer hardware, MDC-2, Encryption, Epistemology, 0102 computer and information sciences, 02 engineering and technology, 01 natural sciences, Searchable Encryption, TK7885-7895, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Engineering, Double hashing, Beyond Birthday, Artificial Intelligence, Computer security, FOS: Mathematics, 0202 electrical engineering, electronic engineering, information engineering, Cover-free, Attribute-Based Encryption, Control system, Block Ciphers, Block cipher, Block-wise Universal, Cryptography and Error-Correcting Codes, Hash Functions, PMAC, Computer network, Advanced Cryptographic Schemes and Protocols, Hash chain, SHA-2, Computer science, FOS: Philosophy, ethics and religion, Cryptographic hash function, Algorithm, Philosophy, Sum of PRP, Combinatorics, Electrical engineering, Computer Science, Physical Sciences, Hash function, Cryptography, Simple (philosophy), DbHtS, Homomorphic Encryption, Block (permutation group theory), Mathematics, PRF
Popis souboru: application/pdf
-
17
Autoři: a další
Zdroj: IEEE Access. 10:11886-11891
Témata: Economics, Macroeconomics, Heuristic, Hill climbing, 02 engineering and technology, 7. Clean energy, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Hamming distance, Artificial Intelligence, Side-Channel Attacks, FOS: Mathematics, 0202 electrical engineering, electronic engineering, information engineering, Cryptography and Error-Correcting Codes, Hash Functions, Chaos-based Image Encryption Techniques, 4. Education, Bijection, Mathematical optimization, Side channel attack, Discrete mathematics, Hamming weight, 16. Peace & justice, Computer science, Algorithm, Power analysis, Leakage (economics), Block code, Computer Science, Physical Sciences, Cryptography, Optical Encryption, Computer Vision and Pattern Recognition, Hamming code, Decoding methods, Mathematics
Přístupová URL adresa: https://ieeexplore.ieee.org/ielx7/6287639/6514899/09690873.pdf
-
18
Autoři:
Zdroj: Complex & Intelligent Systems, Vol 10, Iss 1, Pp 455-468 (2023)
Témata: FOS: Computer and information sciences, Image Encryption, Robustness (evolution), Encryption, Geometry, Interval-based Pythagorean fuzzy TOPSIS, Information technology, 02 engineering and technology, Operations research, Biochemistry, Gene, Detection and Prevention of Phishing Attacks, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Multi-criteria decision-making, Artificial Intelligence, Substitution box, FOS: Mathematics, 0202 electrical engineering, electronic engineering, information engineering, TOPSIS, Cipher, Block Ciphers, Block cipher, Pythagorean theorem, Chaos-based Image Encryption Techniques, 4. Education, QA75.5-76.95, T58.5-58.64, Computer science, Algorithm, Chemistry, Operating system, Color Image Encryption, Electronic computers. Computer science, Computer Science, Physical Sciences, Cryptography, Computer Vision and Pattern Recognition, Mathematics, Information Systems
Přístupová URL adresa: https://doaj.org/article/8b0d33a8ae4d4bd286a18d2fc56cca8c
-
19
Autoři:
Zdroj: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2018, Iss 2 (2018)
Témata: Computer engineering. Computer hardware, Fault attack, Fault Attacks, 0211 other engineering and technologies, Electronic circuit, Information technology, 02 engineering and technology, Fault (geology), TK7885-7895, Cryptanalysis, Automation, Block cipher, Cryptanalysis of Block Ciphers and Hash Functions, Characterization and Detection of Android Malware, Theoretical computer science, Engineering, Artificial Intelligence, Computer security, 0202 electrical engineering, electronic engineering, information engineering, Fault model, Block Ciphers, Cryptosystem, Seismology, Chaos-based Image Encryption Techniques, Differential Cryptanalysis, Geology, FOS: Earth and related environmental sciences, T58.5-58.64, Computer science, Distributed computing, Electrical engineering, Computer Science, Physical Sciences, Signal Processing, Cryptography, Security Analysis, Computer Vision and Pattern Recognition
Přístupová URL adresa: https://tches.iacr.org/index.php/TCHES/article/download/882/833
https://doaj.org/article/3351d9733aa9446fb3a1756bee44bc44
https://eprint.iacr.org/2018/242
https://eprint.iacr.org/2018/242.pdf
http://dblp.uni-trier.de/db/journals/iacr/iacr2018.html#KumawatP18
https://doi.org/10.13154/tches.v2018.i2.242-276
https://dblp.uni-trier.de/db/journals/tches/tches2018.html#SahaMD18 -
20
Autoři:
Zdroj: IEEE Access, Vol 9, Pp 130399-130409 (2021)
Témata: Parallel computing, Chaotic Maps, Hash tree, security, tent map, 02 engineering and technology, 01 natural sciences, Rolling hash, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Double hashing, Artificial Intelligence, Computer security, Hashing, 0103 physical sciences, 0202 electrical engineering, electronic engineering, information engineering, multiple chaotic function, Hash Functions, cryptography, Chaos-based Image Encryption Techniques, Text Compression and Indexing Algorithms, Hash chain, SHA-2, Collision resistance, Computer science, TK1-9971, Algorithm, Cryptographic hash function, Computer Science, Physical Sciences, Hash function, Cryptography, Electrical engineering. Electronics. Nuclear engineering, Computer Vision and Pattern Recognition, SWIFFT
Full Text Finder
Nájsť tento článok vo Web of Science