The following pages link to (Q2760977):
Displaying 50 items.
- Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties (Q269570) (← links)
- On modes of operations of a block cipher for authentication and authenticated encryption (Q301626) (← links)
- Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour (Q306057) (← links)
- Characterization of almost perfect nonlinear functions in terms of subfunctions (Q314219) (← links)
- A dynamic prime number based efficient security mechanism for big sensing data streams (Q314794) (← links)
- Double image multi-encryption algorithm based on fractional chaotic time series (Q317763) (← links)
- New secure partial encryption method for medical images using graph coloring problem (Q330803) (← links)
- On cross-correlation indicators of an S-box (Q352094) (← links)
- Security-aware optimization for ubiquitous computing systems with SEAT graph approach (Q355496) (← links)
- A matrix approach for constructing quadratic APN functions (Q398972) (← links)
- Towards the optimality of Feistel ciphers with substitution-permutation functions (Q398983) (← links)
- On the differential and linear efficiency of balanced Feistel networks (Q407580) (← links)
- The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers (Q436555) (← links)
- On construction of involutory MDS matrices from Vandermonde matrices in \(\mathrm{GF}(2^q)\) (Q438877) (← links)
- A new hybrid chaotic map and its application on image encryption and hiding (Q474579) (← links)
- Information leakage of VGF2 structure (Q474782) (← links)
- An ID-based signcryption scheme with compartmented secret sharing for unsigncryption (Q477604) (← links)
- AKF: a key alternating Feistel scheme for lightweight cipher designs (Q477688) (← links)
- Modeling energy-efficient secure communications in multi-mode wireless mobile devices (Q494039) (← links)
- Almost universal forgery attacks on AES-based MAC's (Q494579) (← links)
- A methodology for differential-linear cryptanalysis and its applications (Q499655) (← links)
- On weak differential uniformity of vectorial Boolean functions as a cryptographic criterion (Q503549) (← links)
- On the direct construction of recursive MDS matrices (Q510453) (← links)
- Improving impossible-differential attacks against Rijndael-160 and Rijndael-224 (Q510459) (← links)
- Towards a general construction of recursive MDS diffusion layers (Q510464) (← links)
- Improving the security and efficiency of block ciphers based on LS-designs (Q510503) (← links)
- A new counting method to bound the number of active S-boxes in Rijndael and 3D (Q522208) (← links)
- Generic attacks on the Lai-Massey scheme (Q522214) (← links)
- Solving polynomial systems with noise over \(\mathbb{F}_2\): revisited (Q527403) (← links)
- The (related-key) impossible boomerang attack and its application to the AES block cipher (Q543423) (← links)
- Color image encryption based on one-time keys and robust chaotic maps (Q604024) (← links)
- DES with any reduced masked rounds is not secure against side-channel attacks (Q604102) (← links)
- Structural cryptanalysis of SASAS (Q604629) (← links)
- Some remarks on the TKIP key mixing function of IEEE 802.11i (Q615203) (← links)
- Cryptographic properties and application of a generalized unbalanced Feistel network structure (Q662179) (← links)
- Image encryption using chaotic coupled map lattices with time-varying delays (Q720148) (← links)
- An application of the O'Nan-Scott theorem to the group generated by the round functions of an AES-like cipher (Q735032) (← links)
- Revisiting Gilbert's known-key distinguisher (Q780379) (← links)
- Practical forgeries for ORANGE (Q783690) (← links)
- Investigation of some cryptographic properties of the \(8 \times 8\) S-boxes created by quasigroups (Q821312) (← links)
- Involutory-multiple-lightweight MDS matrices based on Cauchy-type matrices (Q825924) (← links)
- A framework to optimize implementations of matrices (Q826298) (← links)
- On the resilience of Even-Mansour to invariant permutations (Q831175) (← links)
- Weak-key distinguishers for AES (Q832335) (← links)
- Improved (related-key) differential cryptanalysis on GIFT (Q832340) (← links)
- On some block ciphers and imprimitive groups (Q843945) (← links)
- On the complexity of parallel algorithms for computing inverses in \(\text{GF}(2^m)\) with \(m\) prime (Q850789) (← links)
- New field of cryptography: DNA cryptography (Q871844) (← links)
- Open problems in hash function security (Q887443) (← links)
- Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications (Q892302) (← links)