9   Artículos

« Anterior     Página: 1 de 1     Siguiente »

 
en línea
Stanislav Marochok and Pavol Zajac    
Cryptographic S-boxes are vectorial Boolean functions that must fulfill strict criteria to provide security for cryptographic algorithms. There are several existing methods for generating strong cryptographic S-boxes, including stochastic search algorith... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Jintao Rao and Zhe Cui    
The SM4 algorithm is widely used to ensure the security of data transmission. The traditional chosen plaintext power attacks against SM4 usually need to analyze four rounds power traces in turn to recover the secret key. In this paper, we propose a new c... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
A. Prathiba and V. S. Kanchana Bhaaskaran    
-
Revista: Information    Formato: Electrónico

 
en línea
Evgenia Ishchukova, Ekaterina Maro and Pavel Pristalov    
In January 2016, a new standard for symmetric block encryption was established in the Russian Federation. The standard contains two encryption algorithms: Magma and Kuznyechik. In this paper we propose to consider the possibility of applying the algebrai... ver más
Revista: Computation    Formato: Electrónico

 
en línea
Khumbelo Muthavhine and Mbuyu Sumbwanyambe    
Cryptographic algorithms installed on Internet of Things (IoT) devices suffer many attacks. Some of these attacks include the differential linear attack (DL). The DL attack depends on the computation of the probability of differential-linear characterist... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Nursulu Kapalova, Kairat Sakan, Kunbolat Algazy and Dilmukhanbet Dyusenbayev    
A new symmetric block cipher algorithm called AL02 has been developed. The algorithm scheme provides five-round encryption of 128-bit blocks, while the data size at the input and output of the S-box is 8 bits. The main transformation is the F transformat... ver más
Revista: Computation    Formato: Electrónico

 
en línea
Carlos Miguel Legón-Pérez, Jorge Ariel Menéndez-Verdecía, Ismel Martínez-Díaz, Guillermo Sosa-Gómez, Omar Rojas and Germania del Roció Veloz-Remache    
During the search for S-boxes resistant to Power Attacks, the S-box space has recently been divided into Hamming Weight classes, according to its theoretical resistance to these attacks using the metric variance of the confusion coefficient. This partiti... ver más
Revista: Information    Formato: Electrónico

 
en línea
Bashar Saadoon Mahdi, Mustafa Jasim Hadi and Ayad Rodhan Abbas    
Computer security depends mainly on passwords to protect human users from attackers. Therefore, manual and alphanumerical passwords are the most frequent type of computer authentication. However, creating these passwords has significant drawbacks. For ex... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Ali Takieldeen, Said H. Abd Elkhalik, Ahmed S. Samra, Mohamed A. Mohamed and Fahmi Khalifa    
With the progressive development of a wide range of applications, interconnect things and internet of things (IoT) became an imperative required trend by industries and academicians. IoT became a base infrastructure for remote access or control depending... ver más
Revista: Information    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »