Search Results - "block cipher"

Refine Results
  1. 1

    Enhancement of lightweight block cipher algorithms by Taha Alshaikhli, Imad Fakhri, Al-Dabbagh, Sufyan Salim Mahmood, Zaba, Muhammad Reza

    Published 2017
    “…The second direction proposed another lightweight block cipher algorithm called HISEC (Highest Security lightweight block cipher algorithm). …”
    Get full text
    Get full text
  2. 2

    New directions in cryptanalysis of block ciphers. by RezaeiPour , Davood, Md Said, Mohamad Rushdan

    Published 2009
    “…Approach: The interpolation attack was introduced as a cryptanalytic attack against block ciphers. This attack is useful for cryptanalysis using simple algebraic functions as S-boxes. …”
    Get full text
    Get full text
  3. 3

    Mathematical aspects of selected block ciphers by Alqarni, Yazeed Saeed

    Published 2015
    “…Block ciphers play a key role in many cryptographic protocols that provide communications security in modern society. …”
    Get full text
    Get full text
  4. 4

    Lightweight block cipher algorithms: review paper by Salim, Sufyan, Taha Alshaikhli , Imad Fakhri, Sulaiman, Alyaa Ghanim

    Published 2016
    “…Lightweight block cipher algorithms are very important for constraint environment. …”
    Get full text
    Get full text
  5. 5

    Cryptanalysis Of Block Ciphers: Generalization, Extensions And Integration by Phan, Raphael Chung Wei

    Published 2005
    “…This thesis is about the crytanalysis of block ciphers, and is organized into 3 parts : Generalization, Extensions and Integrations. …”
    Get full text
  6. 6

    A framework for describing block cipher cryptanalysis by Phan, Raphael C. W., Siddiqi, Mohammad Umar

    Published 2006
    “…Block ciphers provide confidentiality by encrypting confidential messages into unintelligible form, which are irreversible without knowledge of the secret key used. …”
    Get full text
    Get full text
  7. 7

    Lightweight block ciphers: A comparative study by Salim, Sufya, Taha, Imad

    Published 2012
    “…Although the AES is an excellent and preferred choice for almost all block cipher applications, it is not suitable for extremely constrained environments such as RFID (Radio-Frequency IDentification) tags and sensor networks. …”
    Get full text
    Get full text
  8. 8

    Key-dependent s-box in lightweight block ciphers by AlDabbagh, S.S.M., Taha Alshaikhli, Imad Fakhri, Zaba, Muhammad Reza

    Published 2014
    “…This paper introduces new methods of how to generate a suitable key-dependent substitution boxes (Sboxes) for use in lightweight block ciphers. An S-box is commonly used in block ciphers to provide the crucial property of nonlinearity. …”
    Get full text
    Get full text
    Get full text
  9. 9

    The vulnerability analysis and the security evaluation of block ciphers by Rezaeipour, Davood, Md. Said, Mohamad Rushdan

    Published 2010
    “…The first step for evaluation of block ciphers is the confidence on attainment of some properties such as completeness, strict avalanche criterion and static information leakage. …”
    Get full text
    Get full text
  10. 10

    A new 128-bit block cipher by Mohd Ali, Fakariah Hani

    Published 2009
    “…Even though there have been so much development of the block cipher, the industry still requires another block cipher as long as security features are met. …”
    Get full text
    Get full text
  11. 11

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…The development of block ciphers have resulted in a number of cryptographic algorithms such as, AES, ARIA, BLOWFISH256, DESL, 3D-AES and many more. …”
    Get full text
    Get full text
  12. 12

    The Construction Of Quantum Block Cipher For Grover Algorithm by Eid, Almazrooie Mishal

    Published 2018
    “…Similarly to classical computing, to conduct a quantum attack on a classical block cipher, the block cipher must be designed and implemented as a quantum reversible circuit in a quantum platform.…”
    Get full text
    Get full text
  13. 13

    Fault Analysis of the KATAN Family of Block Ciphers by Abdul Latip, Shekh Faisal

    Published 2012
    “…In this paper, we investigate the security of the KATAN family of block ciphers against differential fault attacks. KATAN consists of three variants with 32, 48 and 64-bit block sizes, called KATAN32,KATAN48 and KATAN64, respectively. …”
    Get full text
    Get full text
  14. 14
  15. 15

    OLBCA: a new lightweight block cipher algorithm by AlDabbagh, Sufyan Salim Mahmood, Alshaikhli, Imad Fakhri Taha

    Published 2014
    “…Lightweight block cipher algorithms are vital for constrained environment. …”
    Get full text
    Get full text
  16. 16
  17. 17

    Secure block cipher inspired by the human immune system by Ariffin, Suriyani

    Published 2012
    “…It is proven that the 3D-AES block cipher has successfully passed very demanding security analyses and justified that the 3D-AES block cipher is a secure block cipher. …”
    Get full text
    Get full text
  18. 18

    New DNA based dynamical S-Box for block cipher by Chng, Chern Wei, Md. Yasin, Sharifah, Abdullah, Mohd. Taufik, Udzir, Nur Izura

    Published 2018
    “…This article discusses a new DNA based Dynamical S-Box for the symmetric keys block ciphers. The DNA based Dynamical S-Box is proposed using a polynomial calculation in producing an unknown DNA sequences of {A,C,G,T} in mapping the S-Box table in the form of metric [16x16]. …”
    Get full text
    Get full text
  19. 19

    Dynamic determinant matrix-based block cipher algorithm by Juremi, Julia

    Published 2018
    “…Rijndael (AES) is a well-known block cipher algorithm with proven robustness towards countless cryptographic attacks. …”
    Get full text
    Get full text
  20. 20

    Efficient dynamic DNA-based block cipher algorithm by Chng, Chern Wei

    Published 2023
    “…The significance of block cipher algorithms lies in their versatility and resilience. …”
    Get full text
    Get full text