The new variable-length key symmetric cryptosystem
Problem statement: In this study, we proposed a new 64-bit block cipher that accepted a variable-length key up to 512 bits, which was suitable for implementation in a variety of environments. Approach: The cipher algorithm was a 16-round Feistel network with a bijective function f and was made u...
| Main Authors: | Pour, Davood Rezaei, Md. Said, Mohamad Rushdan, Mohd Atan, Kamel Ariffin, Othman, Mohamed |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Science Publications
2009
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/17249/ http://psasir.upm.edu.my/id/eprint/17249/1/The%20new%20variable.pdf |
Similar Items
A new class of efficient piecewise nonlinear chaotic maps for secure cryptosystems
by: Li, Y., et al.
Published: (2009)
by: Li, Y., et al.
Published: (2009)
Absolute deviance method for symmetrical uniform designs
by: Lau, Grace Chui Ting
Published: (2015)
by: Lau, Grace Chui Ting
Published: (2015)
Symmetrical non-separable wavelet transforms in remote sensing image fusion
by: Butaev, Almaz
Published: (2012)
by: Butaev, Almaz
Published: (2012)
The extensions on algebraic attack in AES cryptosystem
by: RezaeiPour, Davood, et al.
Published: (2009)
by: RezaeiPour, Davood, et al.
Published: (2009)
A genetic algorithm for symmetric travelling salesman problem eith due dates
by: Lee, Lai Soon, et al.
Published: (2007)
by: Lee, Lai Soon, et al.
Published: (2007)
Convergence of interval symmetric single-step method for simultaneous inclusion of real polynomial zeros
by: Salim, Nur Raidah
Published: (2012)
by: Salim, Nur Raidah
Published: (2012)
Adaptive control scheme for anti- synchronization of chaotic dynamical systems
by: Maheri, Mahmoud
Published: (2016)
by: Maheri, Mahmoud
Published: (2016)
Theory and numerical modelling of parity-time symmetric structures for photonics
by: Phang, Sendy
Published: (2016)
by: Phang, Sendy
Published: (2016)
Finite-wavelength instability coupled to a Goldstone mode: the Nikolaevskiy equation
by: Simbawa, Eman
Published: (2011)
by: Simbawa, Eman
Published: (2011)
Chaos synchronization of logistics, Qi and Maxwell-Bloch systems for chaos-based communication
by: Abdul Fataf, Nur Aisyah
Published: (2018)
by: Abdul Fataf, Nur Aisyah
Published: (2018)
Key exchange for new cryptosystem analogous to LUCELG
and Cramer-Shoup
by: Muslim, Norliana, et al.
Published: (2013)
by: Muslim, Norliana, et al.
Published: (2013)
A new public key cryptosystem based on IFS
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2010)
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2010)
Nonlinearity analyses and adaptation of nonlinearity traits of key generation protocol of el-gamal AAß cryptosystem
by: Ahmad, Miza Mumtaz
Published: (2011)
by: Ahmad, Miza Mumtaz
Published: (2011)
Computation of private key for LUC cryptosystem
by: Md Ali, Zulkarnain, et al.
Published: (2009)
by: Md Ali, Zulkarnain, et al.
Published: (2009)
AAβ-Cryptosystem: a chaos based public key cryptosystem
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
Cryptanalysis of El-Gamal AAs cryptosystem
by: Mandangan, Arif
Published: (2011)
by: Mandangan, Arif
Published: (2011)
Graphical processes with abelian rotation symmetry
by: Rosli, Ahmad Aqwa
Published: (2023)
by: Rosli, Ahmad Aqwa
Published: (2023)
New directions in cryptanalysis of block ciphers.
by: RezaeiPour , Davood, et al.
Published: (2009)
by: RezaeiPour , Davood, et al.
Published: (2009)
GCD attack on the LUC4 cryptosystem.
by: Wong, Tze Jin, et al.
Published: (2009)
by: Wong, Tze Jin, et al.
Published: (2009)
AAβ public-key cryptosystem - a practical implementation of the new asymmetric
by: Mahad, Zahari, et al.
Published: (2013)
by: Mahad, Zahari, et al.
Published: (2013)
The quartic analog to the RSA cryptosystem
by: Wong, Tze Jin, et al.
Published: (2007)
by: Wong, Tze Jin, et al.
Published: (2007)
Some studies of fluid mixing and transport
by: Finn, Matthew David
Published: (2003)
by: Finn, Matthew David
Published: (2003)
Persistent localized states for a chaotically mixed bistable reaction
by: Cox, Stephen M.
Published: (2006)
by: Cox, Stephen M.
Published: (2006)
An embedded cryptosystem implementing symmetric cipher and public-key crypto algorithms in hardware
by: Hau, Yuan Wen
Published: (2005)
by: Hau, Yuan Wen
Published: (2005)
Garbage-man-in-the-middle attack on the LUC4 cryptosystem.
by: Wong, Tze Jin, et al.
Published: (2009)
by: Wong, Tze Jin, et al.
Published: (2009)
Chaotic map based key agreement with/out clock synchronization
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
A mixer design for the pigtail braid
by: Binder, B. J., et al.
by: Binder, B. J., et al.
Cryptanalysis of polynomial reconstruction problem based cryptosystems
by: Yusof, Siti Nabilah
Published: (2023)
by: Yusof, Siti Nabilah
Published: (2023)
Modified Baptista type cryptosystem via matrix secret key.
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2008)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2008)
Recapturing the timeless past in selected science-based postmodern British plays through lens of chaos theory
by: Yas, Khalid Ahmad
Published: (2018)
by: Yas, Khalid Ahmad
Published: (2018)
Properties of Carbon Nanotubes: An ab Initio Study Using Large Gaussian Basis Sets and Various DFT Functionals
by: Demichelis, Raffaella, et al.
Published: (2011)
by: Demichelis, Raffaella, et al.
Published: (2011)
AAβ public key cryptosystem - a new practical asymmetric implementation based on the square root problem
by: Mahad, Zahari, et al.
Published: (2012)
by: Mahad, Zahari, et al.
Published: (2012)
A bistable reaction-diffusion system in a stretching flow
by: Cox, Stephen M., et al.
Published: (2006)
by: Cox, Stephen M., et al.
Published: (2006)
Chaos Theory Based Detection against Network Mimicking DDoS Attacks
by: Chonka, A., et al.
Published: (2009)
by: Chonka, A., et al.
Published: (2009)
A new cryptosystem analogous to LUCELG and Cramer-Shoup
by: Muslim, Norliana, et al.
Published: (2009)
by: Muslim, Norliana, et al.
Published: (2009)
A new direction in utilization of chaotic fractal functions for cryptosystems.
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
Rounding theorem the possibility of applying cryptosystem on the decimal numbers.
by: Alfaris, Rand, et al.
Published: (2008)
by: Alfaris, Rand, et al.
Published: (2008)
A lucas based cryptosystem analog to the ElGamal cryptosystem and elliptic curve cryptosystem
by: Wong, Tze Jin, et al.
Published: (2014)
by: Wong, Tze Jin, et al.
Published: (2014)
Performance analysis and improvement of rabin primitive based cryptosystems
by: Mahad, Zahari
Published: (2014)
by: Mahad, Zahari
Published: (2014)
A survey of partial key exposure attacks on RSA cryptosystem
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
Similar Items
-
A new class of efficient piecewise nonlinear chaotic maps for secure cryptosystems
by: Li, Y., et al.
Published: (2009) -
Absolute deviance method for symmetrical uniform designs
by: Lau, Grace Chui Ting
Published: (2015) -
Symmetrical non-separable wavelet transforms in remote sensing image fusion
by: Butaev, Almaz
Published: (2012) -
The extensions on algebraic attack in AES cryptosystem
by: RezaeiPour, Davood, et al.
Published: (2009) -
A genetic algorithm for symmetric travelling salesman problem eith due dates
by: Lee, Lai Soon, et al.
Published: (2007)