Some statistical simulation results over the 128-bit block cipher CLEFIA
CLEFIA , a 128-bit block cipher designed using Diffusion Switching Mechanism (DSM) , was proposed by Sony Corporation in 2007. The attainment of some properties such as completeness, strict avalanche criterion and randomness cause the invigoration of confusion and diffusion properties in block ciph...
| Main Authors: | Rezaeipour, Davood, Md. Said, Mohamad Rushdan |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Hikari Ltd
2009
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/16784/ http://psasir.upm.edu.my/id/eprint/16784/1/Some%20statistical%20simulation%20results%20over%20the%20128.pdf |
Similar Items
Improved Algebraic Cryptanalysis of the Reduced-Round Advanced Encryption Standard
by: Rezaeipour, Davood
Published: (2011)
by: Rezaeipour, Davood
Published: (2011)
The vulnerability analysis and the security evaluation of block ciphers
by: Rezaeipour, Davood, et al.
Published: (2010)
by: Rezaeipour, Davood, et al.
Published: (2010)
Musical Cryptography: Codes, Ciphers, Form, and Function
by: Thompson, Benjamin
Published: (2024)
by: Thompson, Benjamin
Published: (2024)
A new 128-bit block cipher
by: Mohd Ali, Fakariah Hani
Published: (2009)
by: Mohd Ali, Fakariah Hani
Published: (2009)
Development of DNA-based dynamic key-dependent block cipher
by: Saeed, Auday H.
Published: (2015)
by: Saeed, Auday H.
Published: (2015)
Enhancing performance of XTS cryptography mode of operation using parallel design
by: Ahmed Alomari, Mohammad
Published: (2009)
by: Ahmed Alomari, Mohammad
Published: (2009)
Mathematical aspects of selected block ciphers
by: Alqarni, Yazeed Saeed
Published: (2015)
by: Alqarni, Yazeed Saeed
Published: (2015)
Dynamic determinant matrix-based block cipher algorithm
by: Juremi, Julia
Published: (2018)
by: Juremi, Julia
Published: (2018)
Performance analysis and improvement of rabin primitive based cryptosystems
by: Mahad, Zahari
Published: (2014)
by: Mahad, Zahari
Published: (2014)
A faster version of rijndael cryptographic algorithm using
cyclic shift and bit wise operations
by: Mohd Ali, Fakariah Hani, et al.
Published: (2009)
by: Mohd Ali, Fakariah Hani, et al.
Published: (2009)
Secure block cipher inspired by the human immune system
by: Ariffin, Suriyani
Published: (2012)
by: Ariffin, Suriyani
Published: (2012)
New compendium of RSA vulnerabilities
by: Abd Ghafar, Amir Hamzah
Published: (2020)
by: Abd Ghafar, Amir Hamzah
Published: (2020)
Improved security of Rijndael key expansion function
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017)
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017)
New directions in cryptanalysis of block ciphers.
by: RezaeiPour , Davood, et al.
Published: (2009)
by: RezaeiPour , Davood, et al.
Published: (2009)
A modified approach to improve the performance of AES using feistel structure
by: Al-Ansi, Afeef Yahya Ahmed
Published: (2018)
by: Al-Ansi, Afeef Yahya Ahmed
Published: (2018)
The block cipher algorithm–properties, encryption efficiency analysis and security evaluation
by: Rezaeipour, Davood, et al.
Published: (2010)
by: Rezaeipour, Davood, et al.
Published: (2010)
Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)
Annihilators through fault injection analysis on selected stream ciphers
by: Omar @ Othman, Wan Zariman
Published: (2019)
by: Omar @ Othman, Wan Zariman
Published: (2019)
Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA
by: Ahmed, Shakil
Published: (2013)
by: Ahmed, Shakil
Published: (2013)
Securing the image through the combination of elliptic curve cryptosystem and hill cipher encryption
by: Sulaiman, Saniah
Published: (2019)
by: Sulaiman, Saniah
Published: (2019)
Security Study and Encryption / Decryption Method
by: Al-Qdah, Majdi Taysir
Published: (2000)
by: Al-Qdah, Majdi Taysir
Published: (2000)
Key Transformation Approach for Rijndael Security
by: Sulong, Mek Rahmah
Published: (2008)
by: Sulong, Mek Rahmah
Published: (2008)
Improving The Randomness of Output Sequence for The Advanced Encryption Standard Cryptographic Algorithm
by: Abdulbari Ali, Sherif
Published: (2005)
by: Abdulbari Ali, Sherif
Published: (2005)
A systematic mapping on risks and techniques to enhance security in multi-cloud environments
by: Gonzalez Alberto, Ana Y
Published: (2017)
by: Gonzalez Alberto, Ana Y
Published: (2017)
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
by: Md Yasin, Sharifah
Published: (2011)
by: Md Yasin, Sharifah
Published: (2011)
A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate
by: Abdulraheem, Waleed Khalid Amin
Published: (2019)
by: Abdulraheem, Waleed Khalid Amin
Published: (2019)
Design of robust and fragile image watermarking system for copyright protection and authentication using lifting wavelet transform and bivariate empirical mode decomposition techniques
by: Abbas, Nidaa Hasan
Published: (2017)
by: Abbas, Nidaa Hasan
Published: (2017)
Secret sharing scheme for key management of secure data sharing in cloud
by: Abd Majid, Noorhafezan
Published: (2019)
by: Abd Majid, Noorhafezan
Published: (2019)
Development of authentication code based on spectral amplitude coding optical code division multiplexing for multi-user pseudo quantum key distribution
by: Abiola, Taiwo Ambali
Published: (2018)
by: Abiola, Taiwo Ambali
Published: (2018)
Encryption selection for WLAN IEEE802.11G
by: Ahmad, Zahrol Azam
Published: (2013)
by: Ahmad, Zahrol Azam
Published: (2013)
Effects of variation theory-based strategy on form two students' algebraic achievement and motivation
by: Ting, Jing Jing
Published: (2016)
by: Ting, Jing Jing
Published: (2016)
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
by: Wong, Tze Jin
Published: (2006)
by: Wong, Tze Jin
Published: (2006)
Enhancement of {0, 1, 3}-NAF Recoding Algorithm using Block Method Technique for Elliptic Curve Cryptosystem
by: Bafandehkar, Mohsen
Published: (2015)
by: Bafandehkar, Mohsen
Published: (2015)
Design and performance evaluation of parallel elliptic curve cryptosystem with GF(P) projective coordinates
by: Hussein Fayiz, Mohammad Al-Khatib
Published: (2012)
by: Hussein Fayiz, Mohammad Al-Khatib
Published: (2012)
Sharp-Edges Steganography in Arabic Characters for Information Hiding
by: Roslan, Nuur Alifah
Published: (2011)
by: Roslan, Nuur Alifah
Published: (2011)
Cryptanalysis of RSA and its variants using continuous midpoint subdivision analysis and lattices
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021)
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021)
Cryptanalysis of polynomial reconstruction problem based cryptosystems
by: Yusof, Siti Nabilah
Published: (2023)
by: Yusof, Siti Nabilah
Published: (2023)
A new encryption algorithm over elliptic curve
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations
by: Mohd Ali, Fakariah Hani
Published: (2004)
by: Mohd Ali, Fakariah Hani
Published: (2004)
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
by: Asbullah, Muhammad Asyraf
Published: (2015)
by: Asbullah, Muhammad Asyraf
Published: (2015)
Similar Items
-
Improved Algebraic Cryptanalysis of the Reduced-Round Advanced Encryption Standard
by: Rezaeipour, Davood
Published: (2011) -
The vulnerability analysis and the security evaluation of block ciphers
by: Rezaeipour, Davood, et al.
Published: (2010) -
Musical Cryptography: Codes, Ciphers, Form, and Function
by: Thompson, Benjamin
Published: (2024) -
A new 128-bit block cipher
by: Mohd Ali, Fakariah Hani
Published: (2009) -
Development of DNA-based dynamic key-dependent block cipher
by: Saeed, Auday H.
Published: (2015)