A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Due to the ubiquity of digital communications and digital data in today’s world, the development of techniques and tools to protect wireless communications and information transfer has become increasingly important. Currently, static substitution boxes (S-Boxes) are vulnerable to data and subkey...
| Main Author: | Hamdi, Ayman Majid |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2019
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/90769/ http://psasir.upm.edu.my/id/eprint/90769/1/FSKTM%202019%2057%20IR.pdf |
Similar Items
Secure block cipher inspired by the human immune system
by: Ariffin, Suriyani
Published: (2012)
by: Ariffin, Suriyani
Published: (2012)
Mathematical aspects of selected block ciphers
by: Alqarni, Yazeed Saeed
Published: (2015)
by: Alqarni, Yazeed Saeed
Published: (2015)
Key dependent dynamic S-Boxes on 3D cellular automata for block cipher
by: Md Yasin, Sharifah, et al.
Published: (2020)
by: Md Yasin, Sharifah, et al.
Published: (2020)
Efficient dynamic DNA-based block cipher algorithm
by: Chng, Chern Wei
Published: (2023)
by: Chng, Chern Wei
Published: (2023)
Cellular Automata-based Algorithm for Liquid Diffusion Phenomenon Modeling using imaging technique
by: Al-Ghaili, Abbas Mohammed Ali
Published: (2013)
by: Al-Ghaili, Abbas Mohammed Ali
Published: (2013)
Dynamic determinant matrix-based block cipher algorithm
by: Juremi, Julia
Published: (2018)
by: Juremi, Julia
Published: (2018)
Annihilators through fault injection analysis on selected stream ciphers
by: Omar @ Othman, Wan Zariman
Published: (2019)
by: Omar @ Othman, Wan Zariman
Published: (2019)
The vulnerability analysis and the security evaluation of block ciphers
by: Rezaeipour, Davood, et al.
Published: (2010)
by: Rezaeipour, Davood, et al.
Published: (2010)
A collision resistant cryptographic hash function based on cellular automata rules
by: Jamil, Norziana
Published: (2013)
by: Jamil, Norziana
Published: (2013)
Understanding the evolution of superalloy microstructure during inertia friction welding using in-situ x-ray diffraction and cellular automata
by: Rowson, Matthew
Published: (2021)
by: Rowson, Matthew
Published: (2021)
Cellular automation for efficient impulse noise removal and edge detection using graphic processor unit
by: Jalalian, Afsaneh
Published: (2010)
by: Jalalian, Afsaneh
Published: (2010)
A new block cipher based on finite automata systems
by: Khaleel, Ghassan, et al.
Published: (2016)
by: Khaleel, Ghassan, et al.
Published: (2016)
Extending dynamic models of mining subsidence
by: Xu-gang, Lian, et al.
Published: (2011)
by: Xu-gang, Lian, et al.
Published: (2011)
Key-dependent s-box in lightweight block ciphers
by: AlDabbagh, S.S.M., et al.
Published: (2014)
by: AlDabbagh, S.S.M., et al.
Published: (2014)
Development of DNA-based dynamic key-dependent block cipher
by: Saeed, Auday H.
Published: (2015)
by: Saeed, Auday H.
Published: (2015)
New DNA based dynamical S-Box for block cipher
by: Chng, Chern Wei, et al.
Published: (2018)
by: Chng, Chern Wei, et al.
Published: (2018)
Periodic Cellular Automata of Period-3
by: Ganikhodjaev, Nasir, et al.
Published: (2015)
by: Ganikhodjaev, Nasir, et al.
Published: (2015)
Periodic cellular automata of Period-3
by: Ganikhodjaev, Nasir, et al.
Published: (2015)
by: Ganikhodjaev, Nasir, et al.
Published: (2015)
Desertification prediction with an integrated 3D convolutional neural network and cellular automata in Al-Muthanna, Iraq
by: Aldabbagh, Yasir Abdulameer Nayyef, et al.
Published: (2022)
by: Aldabbagh, Yasir Abdulameer Nayyef, et al.
Published: (2022)
Energy trust system for detecting sybil attacks in clustered wireless sensor network
by: Hussein, Noor Sabeeh
Published: (2016)
by: Hussein, Noor Sabeeh
Published: (2016)
Danger theory based node replication attack detection and mitigation in cluster mobile wireless sensor nodes
by: Shaukat, Haafizah Rameeza
Published: (2014)
by: Shaukat, Haafizah Rameeza
Published: (2014)
Behavior and profile of high-speed internet broadband users
by: Wan Jusoh, Wan Jamaliah
Published: (2012)
by: Wan Jusoh, Wan Jamaliah
Published: (2012)
Empirical analysis of android apps permissions
by: Awang Abu Bakar, Normi Sham, et al.
Published: (2013)
by: Awang Abu Bakar, Normi Sham, et al.
Published: (2013)
Celcom core earner for TMI
Published: (2008)
Published: (2008)
Wireless sensor nodes deployment using multi-robot based on improved spanning tree algorithm
by: Arezoumand, Reza
Published: (2015)
by: Arezoumand, Reza
Published: (2015)
Performance analysis on detection and prevention of wormhole attack in wireless network
by: Apandi, Mohamad Aiman Hanif
Published: (2019)
by: Apandi, Mohamad Aiman Hanif
Published: (2019)
Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security
by: Shamsudin, Ahmad Faizul, et al.
Published: (2010)
by: Shamsudin, Ahmad Faizul, et al.
Published: (2010)
Unite in celebration with Merdeka cheer ringtone
Published: (2008)
Published: (2008)
Block and stream cipher
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
Taxonomy of attacks on wireless sensor networks
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Mitigating malicious nodes using trust and reputation based model in wireless sensor networks
by: Abdullah, Muhammad Daniel Hafiz
Published: (2018)
by: Abdullah, Muhammad Daniel Hafiz
Published: (2018)
Immune Cells Function and Activation in Response to Carica Papaya L. Consumed by Healthy Individuals
by: Loh, Chiew Yee
Published: (2011)
by: Loh, Chiew Yee
Published: (2011)
Customers' perception towards cellular mobile telephone operators
by: Rahman, Muhammad Sabbir, et al.
Published: (2013)
by: Rahman, Muhammad Sabbir, et al.
Published: (2013)
A Secure Key Management Model for Wireless Mesh Networks
by: Gao, Li, et al.
Published: (2010)
by: Gao, Li, et al.
Published: (2010)
Wireless Multimedia Sensor Networks Applications and Security Challenges
by: Harjito, Bambang, et al.
Published: (2010)
by: Harjito, Bambang, et al.
Published: (2010)
A cellular neural network methodology for deformable object simulation
by: Zhong, Yongmin, et al.
Published: (2006)
by: Zhong, Yongmin, et al.
Published: (2006)
Enhanced differentiation of 3T3-L1 adipocytes by extracts of Pleurotus giganteus (Berk) Karunarathna & K.D. Hyde / Puvaneswari Paravamsivam
by: Puvaneswari , Paravamsivam
Published: (2017)
by: Puvaneswari , Paravamsivam
Published: (2017)
Teletraffic Performance of Hierarchical Cellular Network in Different Populations of Slow Mobile Generated Traffics
by: Ali, Abdul Halim
Published: (1999)
by: Ali, Abdul Halim
Published: (1999)
Periodic cellular automata of period-2
by: Ganikhodjaev, Nasir, et al.
Published: (2016)
by: Ganikhodjaev, Nasir, et al.
Published: (2016)
Automated evolutionary design of self-assembly and self-organising systems
by: Terrazas Angulo, German
Published: (2009)
by: Terrazas Angulo, German
Published: (2009)
Similar Items
-
Secure block cipher inspired by the human immune system
by: Ariffin, Suriyani
Published: (2012) -
Mathematical aspects of selected block ciphers
by: Alqarni, Yazeed Saeed
Published: (2015) -
Key dependent dynamic S-Boxes on 3D cellular automata for block cipher
by: Md Yasin, Sharifah, et al.
Published: (2020) -
Efficient dynamic DNA-based block cipher algorithm
by: Chng, Chern Wei
Published: (2023) -
Cellular Automata-based Algorithm for Liquid Diffusion Phenomenon Modeling using imaging technique
by: Al-Ghaili, Abbas Mohammed Ali
Published: (2013)