Suggested Topics within your search.
Suggested Topics within your search.
QA75 Electronic computers. Computer science
7
TK Electrical engineering. Electronics Nuclear engineering
5
Gender studies, gender groups
4
History of engineering and technology
4
Coding theory & cryptology
3
Cryptography
3
History
3
Technology: general issues
3
Applied mathematics
2
Biblical studies & exegesis
2
Computer science
2
Humanities
2
Information technology industries
2
Philosophy: aesthetics
2
QA75.5-76.95 Electronic computers. Computer science
2
Sociology & anthropology
2
Sociology and anthropology
2
Theory of art
2
Trivium
2
5G mobile communication systems
1
A5-GMR-2 stream cipher
1
AES
1
Advanced technology
1
Art & design styles: Romanticism
1
Asian history
1
Authentication
1
Big Data Computing
1
Big data
1
Block Cipher
1
Block cipher
1
-
121
-
122
-
123by Ghusoon Basheer“... to obtain a best secret key in polyalphabetic substitution cipher. This key will be used then for encryption...”
Published 2008-07-01
Get full text
Article -
124
-
125“... the cipher text block and the rate part of the next feedback (in traditional sponge these two values...”
Get full text
Article -
126by Jaewoo So“... the model tries to find the key of block ciphers from known plaintext-ciphertext pairs. We show...”
Published 2020-01-01
Get full text
Article -
127
-
128by عامر عبد اللهيبي“... In this paper, a method for hiding cipher text in an image file is introduced . The proposed...”
Published 2019-02-01
Get full text
Article -
129“...Fault attack is an efficient cryptanalysis method against cipher implementations and has attracted...”
Get full text
Article -
130
-
131
-
132by Harry Bartlett, Ed Dawson, Hassan Qahur Al Mahri, Md. Iftekhar Salam, Leonie Simpson, Kenneth Koon-Ho Wong“...In this paper, we show that stream ciphers with a particular form of ciphertext output function...”
Published 2019-01-01
Get full text
Article -
133by Андрей Александрович НастенкоSubjects: “...symmetric block cipher, the statistical security, correlation properties, avalanche effect...”
Published 2012-09-01
Get full text
Article -
134“...Recent lightweight block cipher competition (FELICS Triathlon) evaluates efficient implementations...”
Get full text
Article -
135
-
136by Iftekhar Salam, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong“... cipher algorithm MORUS. We propose fault attacks on MORUS with two different goals: one to breach...”
Published 2018-01-01
Get full text
Article -
137Subjects: “...Back propagation, Ciphering, Encryption, FPGA, Neural Network, VHDL...”
Get full text
Article -
138“... the neural networks in block cipher algorithms. Taking into consideration different plaintexts block size...”
Get full text
Article -
139“... generated a valid MAC. The proposed security scheme incorporates an FIPS approved and secure block cipher...”
Get full text
Article -
140