Avalanche Analysis of Extended Feistel Network
In general, block ciphers consist of one top-level structural model into which the round function F is plugged into. In order to analyze the security of a cipher, it is also important to study the intrinsic security provided by these top-level structural models. Most research focuses in determinin...
| Main Authors: | Ibrahim, Subariah, Maarof, Mohd. Aizaini, Idris, Norbik Bashah |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2005
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/3258/ http://eprints.utm.my/3258/1/Subariah_PARS05.pdf |
Similar Items
Diffusion analysis af a scalable fiestel network
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Diffusion analysis of EFN-MDS structure
by: Ibrahim, Subariah, et al.
Published: (2006)
by: Ibrahim, Subariah, et al.
Published: (2006)
A Review on Biological Inspired Computation in Cryptology
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Modified key size determination models for symmetric ciphers
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Symmetric Key Size for Different Level of Information Classification
by: Ibrahim, Subariah, et al.
Published: (2006)
by: Ibrahim, Subariah, et al.
Published: (2006)
Improved hybrid intelligent intrusion detection system using AI technique
by: Shanmugam, Bharanidharan, et al.
Published: (2007)
by: Shanmugam, Bharanidharan, et al.
Published: (2007)
Cryptanalysis in cryptographic algorithm design
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
Iterative window size estimation on self-similarity measurement for network traffic anomaly detection
by: Idris, Mohd. Yazid, et al.
Published: (2004)
by: Idris, Mohd. Yazid, et al.
Published: (2004)
Fast optimization method : the window size and hurst parameter estimator on self-similar network traffic
by: Idris, Mohd. Yazid, et al.
Published: (2007)
by: Idris, Mohd. Yazid, et al.
Published: (2007)
A new tv-based database encryption scheme using ts block cipher
by: Mohamed Sidek, Zailani, et al.
Published: (2004)
by: Mohamed Sidek, Zailani, et al.
Published: (2004)
Diffusion analysis of EFN-MDS structure
by: Ibrahim, Subariah
Published: (2006)
by: Ibrahim, Subariah
Published: (2006)
Class specific features for attacks in network intrusion detection system
by: Zainal, Anazida, et al.
Published: (2008)
by: Zainal, Anazida, et al.
Published: (2008)
A modified approach to improve the performance of AES using feistel structure
by: Al-Ansi, Afeef Yahya Ahmed
Published: (2018)
by: Al-Ansi, Afeef Yahya Ahmed
Published: (2018)
Clonal selection algorithm for the cryptanalysis of a simple substitution cipher
by: Ahmad, Badrisham, et al.
Published: (2006)
by: Ahmad, Badrisham, et al.
Published: (2006)
Secret sharing scheme for collaborative access system
by: Kadir, Rashidah, et al.
Published: (2000)
by: Kadir, Rashidah, et al.
Published: (2000)
Cryptanalysis using biological inspired computing approaches
by: Ahmad, Badrisham, et al.
Published: (2006)
by: Ahmad, Badrisham, et al.
Published: (2006)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
A friend mechanism for mobile ad hoc networks
by: Abd. Razak, Shukor, et al.
Published: (2008)
by: Abd. Razak, Shukor, et al.
Published: (2008)
Multiplication Gain and Excess Noise Factor in Double Heterojunction Avalanche Photodiodes
by: A. H., You, et al.
Published: (2008)
by: A. H., You, et al.
Published: (2008)
Modelling Of Single Photon Avalanche Diodes
by: Li, Tan Siew
Published: (2008)
by: Li, Tan Siew
Published: (2008)
Malware Analysis with Multiple Features
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
Effect of doping concentration on avalanche multiplication and excess noise factor in submicron APD
by: YOU, A, et al.
Published: (2008)
by: YOU, A, et al.
Published: (2008)
A survey on the cryptanalysis of the advanced encryption standard
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
The optimization of stepping stone detection : packet capturing steps
by: Omar, Mohd. Nizam, et al.
Published: (2006)
by: Omar, Mohd. Nizam, et al.
Published: (2006)
The optimization of stepping stone detection: Packet capturing steps
by: Omar, Mohd Nizam, et al.
Published: (2006)
by: Omar, Mohd Nizam, et al.
Published: (2006)
Solving time gap problems through the optimization of detecting stepping stone algorithm
by: Omar, Mohd. Nizam, et al.
Published: (2004)
by: Omar, Mohd. Nizam, et al.
Published: (2004)
How AIS Addresses Adaptability in IDS
by: Zainal, Anazida, et al.
Published: (2005)
by: Zainal, Anazida, et al.
Published: (2005)
A Systematic Mapping Study on Cloud-Based Mobile Application Testing
by: Ya'u, Badamasi Imam, et al.
Published: (2019)
by: Ya'u, Badamasi Imam, et al.
Published: (2019)
Research issues in adaptive intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
The optimization of stepping stone detection: packet capturing steps
by: Omar, Mohd. Nizam, et al.
Published: (2006)
by: Omar, Mohd. Nizam, et al.
Published: (2006)
Feature selection using rough set in intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
Finding granular features using rough-PSO in IDS
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Feature selection using rough-dpso in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Recommended guidelines of electronic academic assets
by: Ibrahim, Subariah, et al.
Published: (2002)
by: Ibrahim, Subariah, et al.
Published: (2002)
Security guidelines of electronic academic assets
by: Ibrahim, Subariah, et al.
Published: (2002)
by: Ibrahim, Subariah, et al.
Published: (2002)
Performance analysis of convolutional neural networks extended with predefined kernels in image classification / Arash Fatehi
by: Arash , Fatehi
Published: (2022)
by: Arash , Fatehi
Published: (2022)
Security awareness: A lesson from Tcpdump and Ethereal
by: Rohani, Mohd. Fo’ad, et al.
Published: (2005)
by: Rohani, Mohd. Fo’ad, et al.
Published: (2005)
Ensemble based categorization and adaptive model for malware detection
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2011)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2011)
Electronic Voting System: Preliminary Study
by: Ibrahim, Subariah, et al.
Published: (2000)
by: Ibrahim, Subariah, et al.
Published: (2000)
A systematic mapping study on cloud-based mobile application testing
by: Badamasi, Imam Ya'au, et al.
Published: (2019)
by: Badamasi, Imam Ya'au, et al.
Published: (2019)
Similar Items
-
Diffusion analysis af a scalable fiestel network
by: Ibrahim, Subariah, et al.
Published: (2005) -
Diffusion analysis of EFN-MDS structure
by: Ibrahim, Subariah, et al.
Published: (2006) -
A Review on Biological Inspired Computation in Cryptology
by: Ibrahim, Subariah, et al.
Published: (2005) -
Modified key size determination models for symmetric ciphers
by: Ibrahim, Subariah, et al.
Published: (2005) -
Symmetric Key Size for Different Level of Information Classification
by: Ibrahim, Subariah, et al.
Published: (2006)