Diffusion analysis of EFN-MDS structure
In general, block ciphers consist of one top-level structural model into which the round function F is plugged into. The study focuses on Extended-Feistel-Network (EFN) that is a generalization of a Feistel Network (FN). This structure is employed in several ciphers that were developed for Advance...
| Main Author: | Ibrahim, Subariah |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2006
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/3259/ http://eprints.utm.my/3259/1/DiffusionAnalysis_EFN_MDS_1Mac06.pdf |
Similar Items
Diffusion analysis of EFN-MDS structure
by: Ibrahim, Subariah, et al.
Published: (2006)
by: Ibrahim, Subariah, et al.
Published: (2006)
Diffusion analysis af a scalable fiestel network
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Avalanche Analysis of Extended Feistel Network
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Recommended guidelines of electronic academic assets
by: Ibrahim, Subariah, et al.
Published: (2002)
by: Ibrahim, Subariah, et al.
Published: (2002)
Security guidelines of electronic academic assets
by: Ibrahim, Subariah, et al.
Published: (2002)
by: Ibrahim, Subariah, et al.
Published: (2002)
Symmetric Key Size for Different Level of Information Classification
by: Ibrahim, Subariah, et al.
Published: (2006)
by: Ibrahim, Subariah, et al.
Published: (2006)
A Review on Biological Inspired Computation in Cryptology
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Modified key size determination models for symmetric ciphers
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Electronic Voting System: Preliminary Study
by: Ibrahim, Subariah, et al.
Published: (2000)
by: Ibrahim, Subariah, et al.
Published: (2000)
Image encryption algorithm based on chaotic mapping
by: Salleh, Mazleena, et al.
Published: (2003)
by: Salleh, Mazleena, et al.
Published: (2003)
Secure E-Voting With Blind Signature
by: Ibrahim, Subariah, et al.
Published: (2003)
by: Ibrahim, Subariah, et al.
Published: (2003)
Steganography : random LSB insertion using discrete logarithm
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
Cryptanalysis in cryptographic algorithm design
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
COMPARATIVE ANALYSIS ON TIME SERIES WITH INCLUDED STRUCTURAL BREAK
by: Vasant, Pandian
Published: (2009)
by: Vasant, Pandian
Published: (2009)
Clonal selection algorithm for the cryptanalysis of a simple substitution cipher
by: Ahmad, Badrisham, et al.
Published: (2006)
by: Ahmad, Badrisham, et al.
Published: (2006)
An online framework for civil unrest prediction using tweet stream based on tweet weight and event diffusion
by: Islam, Md Kamrul, et al.
Published: (2020)
by: Islam, Md Kamrul, et al.
Published: (2020)
Comparison of retrieval schemes based on different structure and similarity measures for Malaysia's fatwa
by: Ibrahim, Mohd. Nazri
Published: (2007)
by: Ibrahim, Mohd. Nazri
Published: (2007)
Iterative structures
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Geographical distance and news diffusion associating with the sentiment of tweets: Case Study on London Bridge Attack 2017
by: Teh, Phoey Lee *, et al.
Published: (2020)
by: Teh, Phoey Lee *, et al.
Published: (2020)
Structure of research proposal
by: Taha Alshaikhli, Imad Fakhri
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri
Published: (2017)
Review of iterative structures
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Internal structure of computer systems
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
CERT team involving GEs structured
by: Abdulkareem Alenezi, Khaled, et al.
Published: (2015)
by: Abdulkareem Alenezi, Khaled, et al.
Published: (2015)
Earthquake and structural monitoring system (ENSMS)
by: Raja Ali, Raja Norasyikin
Published: (2008)
by: Raja Ali, Raja Norasyikin
Published: (2008)
Towards gene network estimation with structure learning
by: Zainudin, Suhaila, et al.
Published: (2006)
by: Zainudin, Suhaila, et al.
Published: (2006)
Prospective development in diffusion barrier layers for copper metallization in LSI
by: Wong, H.Y., et al.
Published: (2007)
by: Wong, H.Y., et al.
Published: (2007)
Neuro-adaptive vibration suppression of flexible beam structures
by: Mohd. Hashim, Siti Zaiton, et al.
Published: (2004)
by: Mohd. Hashim, Siti Zaiton, et al.
Published: (2004)
Compiler-based prefetching algorithm for recursive data structure
by: Anuar, Nurulhaini
Published: (2007)
by: Anuar, Nurulhaini
Published: (2007)
SCDSP: a novel stream cipher with dynamic structure and parameters
by: Mohamed Eljadi, Fardous, et al.
Published: (2015)
by: Mohamed Eljadi, Fardous, et al.
Published: (2015)
Hierarchical structural driven model for integrative information management architecture
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2013)
by: Mohd Tamrin, Mohd Izzuddin, et al.
Published: (2013)
A network topology approach to diagnose the shift of covariance structure
by: Nur Syahidah, Yusoff, et al.
Published: (2018)
by: Nur Syahidah, Yusoff, et al.
Published: (2018)
Meaning preservation in Example-based Machine Translation with structural semantics
by: Chua, Chongchai, et al.
Published: (2017)
by: Chua, Chongchai, et al.
Published: (2017)
Effectiveness of structured query language injection attacks detection mechanisms
by: Mohamad, Nurul Zawiyah
Published: (2008)
by: Mohamad, Nurul Zawiyah
Published: (2008)
Diagnosing the viability of functional analysis of a gene sequence process in multiple-recursive bioinformatics experimentalwork situations
by: Ibrahim, Roliana
Published: (2008)
by: Ibrahim, Roliana
Published: (2008)
The role of meta-abilities in the diffusion of tacit knowledge and information systems
by: Selamat, Mohamad Hisyam, et al.
Published: (2004)
by: Selamat, Mohamad Hisyam, et al.
Published: (2004)
Diffusion of iTV advertising in Malaysia: The industry players' perspectives
by: Sarif, Siti Mahfuzah, et al.
Published: (2013)
by: Sarif, Siti Mahfuzah, et al.
Published: (2013)
Tracking via Square Grid of RFID Reader Positioning and Diffusion Algorithm
by: Reza, Ahmed Wasif, et al.
Published: (2011)
by: Reza, Ahmed Wasif, et al.
Published: (2011)
ANN-based performance analysis on human activity recognition
by: Elzein, Nahla Mohammed, et al.
Published: (2020)
by: Elzein, Nahla Mohammed, et al.
Published: (2020)
Influence maximisation towards target users on social networks for information diffusion
by: Temitope, Olanrewaju Abdus-Samad, et al.
Published: (2018)
by: Temitope, Olanrewaju Abdus-Samad, et al.
Published: (2018)
Fast Determination of Items Support Technique from Enhanced Tree Data Structure
by: Abdullah, Zailani, et al.
Published: (2014)
by: Abdullah, Zailani, et al.
Published: (2014)
Similar Items
-
Diffusion analysis of EFN-MDS structure
by: Ibrahim, Subariah, et al.
Published: (2006) -
Diffusion analysis af a scalable fiestel network
by: Ibrahim, Subariah, et al.
Published: (2005) -
Avalanche Analysis of Extended Feistel Network
by: Ibrahim, Subariah, et al.
Published: (2005) -
Recommended guidelines of electronic academic assets
by: Ibrahim, Subariah, et al.
Published: (2002) -
Security guidelines of electronic academic assets
by: Ibrahim, Subariah, et al.
Published: (2002)