Journal articles on the topic 'Symmetric ciphers'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Symmetric ciphers.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Lysytska, Iryna, Kostiantyn Lysytskyi, Oleksii Nariezhnii, and Tetiana Hrinenko. "The influence of S-boxes on the arrival of the cipher to the state of random substitution." Radioelectronic and Computer Systems, no. 3 (September 29, 2023): 150–58. http://dx.doi.org/10.32620/reks.2023.3.12.
Full textJang, Kyungbae, Gyeongju Song, Hyunjun Kim, Hyeokdong Kwon, Hyunji Kim, and Hwajeong Seo. "Efficient Implementation of PRESENT and GIFT on Quantum Computers." Applied Sciences 11, no. 11 (May 23, 2021): 4776. http://dx.doi.org/10.3390/app11114776.
Full textZhang, Ping. "Quantum Related-Key Attack Based on Simon’s Algorithm and Its Applications." Symmetry 15, no. 5 (April 24, 2023): 972. http://dx.doi.org/10.3390/sym15050972.
Full textKaidalov, Dmytro, Roman Oliynykov, and Oleksandr Kazymyrov. "A Method for Security Estimation of the Spn-Based Block Cipher Against Related-Key Attacks." Tatra Mountains Mathematical Publications 60, no. 1 (September 1, 2014): 25–45. http://dx.doi.org/10.2478/tmmp-2014-0023.
Full textJang, Kyoungbae, Seungju Choi, Hyeokdong Kwon, Hyunji Kim, Jaehoon Park, and Hwajeong Seo. "Grover on Korean Block Ciphers." Applied Sciences 10, no. 18 (September 14, 2020): 6407. http://dx.doi.org/10.3390/app10186407.
Full textAhmed, Fatma, and Dalia H. Elkamchouchi. "A New Modified MARS Cryptosystem Based on Niho Exponent with an Enhanced S-Box Generation." Electronics 11, no. 15 (July 26, 2022): 2318. http://dx.doi.org/10.3390/electronics11152318.
Full textFaraoun, Kamel Mohammed. "On the semantic security of cellular automata based pseudo-random permutation using results from the Luby-Rackoff construction." Annales Universitatis Mariae Curie-Sklodowska, sectio AI – Informatica 15, no. 1 (January 1, 2015): 21. http://dx.doi.org/10.17951/ai.2015.15.1.21-31.
Full textSaraiva, Daniel A. F., Valderi Reis Quietinho Leithardt, Diandre de Paula, André Sales Mendes, Gabriel Villarrubia González, and Paul Crocker. "PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices." Sensors 19, no. 19 (October 5, 2019): 4312. http://dx.doi.org/10.3390/s19194312.
Full textHaryono, Wasis. "Comparison Encryption of How to Work Caesar Cipher, Hill Cipher, Blowfish and Twofish." Data Science: Journal of Computing and Applied Informatics 4, no. 2 (July 31, 2020): 100–110. http://dx.doi.org/10.32734/jocai.v4.i2-4004.
Full textKuznetsov, A. A., V. O. Frolenko, E. S. Eremin, and D. V. Ivanenko. "Investigation of cross-platform realizations of stream symmetric ciphers." Radiotekhnika, no. 193 (May 15, 2018): 94–106. http://dx.doi.org/10.30837/rt.2018.2.193.10.
Full textEid Khamees Al-Shammary, Mohammed, and Sufyan Salim Mahmood Al-Dabbagh. "Differential Distribution Table implementation DDT survey." Technium: Romanian Journal of Applied Sciences and Technology 4, no. 10 (November 3, 2022): 15–30. http://dx.doi.org/10.47577/technium.v4i10.7700.
Full textDin, Maiya, Saibal K. Pal, S. K. Muttoo, and Sushila Madan. "A Hybrid Computational Intelligence based Technique for Automatic Cryptanalysis of Playfair Ciphers." Defence Science Journal 70, no. 6 (October 12, 2020): 612–18. http://dx.doi.org/10.14429/dsj.70.15749.
Full textZakaria, Abdul Alif, Azni Haslizan Ab Halim, Farida Ridzuan, Nur Hafiza Zakaria, and Maslina Daud. "LAO-3D: A Symmetric Lightweight Block Cipher Based on 3D Permutation for Mobile Encryption Application." Symmetry 14, no. 10 (September 30, 2022): 2042. http://dx.doi.org/10.3390/sym14102042.
Full textLi, Sijia, Zhiyi Liao, Zhengyang Wu, Zheng Wu, and Lin Ding. "(Quantum) Time-Memory-Data Tradeoff Attacks on the SNOW-V Stream Cipher." Symmetry 14, no. 6 (May 30, 2022): 1127. http://dx.doi.org/10.3390/sym14061127.
Full textZhang, Ping, and Qian Yuan. "Minimizing Key Materials: The Even–Mansour Cipher Revisited and Its Application to Lightweight Authenticated Encryption." Security and Communication Networks 2020 (March 10, 2020): 1–6. http://dx.doi.org/10.1155/2020/4180139.
Full textWei, Yuechuan, Yisheng Rong, and Xu An Wang. "Security Analysis of Cipher ICEBERG against Bit-pattern Based Integral Attack." International Journal of Technology and Human Interaction 12, no. 2 (April 2016): 60–71. http://dx.doi.org/10.4018/ijthi.2016040105.
Full textMILLERIOUX, G., and P. GUILLOT. "SELF-SYNCHRONIZING STREAM CIPHERS AND DYNAMICAL SYSTEMS: STATE OF THE ART AND OPEN ISSUES." International Journal of Bifurcation and Chaos 20, no. 09 (September 2010): 2979–91. http://dx.doi.org/10.1142/s0218127410027532.
Full textStoyanov, Borislav, and Gyurhan Nedzhibov. "Symmetric Key Encryption Based on Rotation-Translation Equation." Symmetry 12, no. 1 (January 2, 2020): 73. http://dx.doi.org/10.3390/sym12010073.
Full textBucerzan, Dominic, Mihaela Crăciun, Violeta Chiș, and Crina Rațiu. "Stream Ciphers Analysis Methods." International Journal of Computers Communications & Control 5, no. 4 (November 1, 2010): 483. http://dx.doi.org/10.15837/ijccc.2010.4.2506.
Full textJin, Xin, Yuwei Duan, Ying Zhang, Yating Huang, Mengdong Li, Ming Mao, Amit Kumar Singh, and Yujie Li. "Fast Search of Lightweight Block Cipher Primitives via Swarm-like Metaheuristics for Cyber Security." ACM Transactions on Internet Technology 21, no. 4 (July 16, 2021): 1–15. http://dx.doi.org/10.1145/3417296.
Full textTomecek, Jozef. "Hardware optimizations of stream cipher rabbit." Tatra Mountains Mathematical Publications 50, no. 1 (December 1, 2011): 87–101. http://dx.doi.org/10.2478/v10127-011-0039-8.
Full textMagdum, Nandinee. "Hybrid Encryption using Symmetric Block and Stream Cipher." International Journal of Engineering and Management Research 13, no. 1 (February 8, 2023): 35–39. http://dx.doi.org/10.31033/ijemr.13.1.4.
Full textOliynykov, Roman, Ivan Gorbenko, Viktor Dolgov, and Viktor Ruzhentsev. "Results of Ukrainian national public cryptographic competition." Tatra Mountains Mathematical Publications 47, no. 1 (December 1, 2010): 99–113. http://dx.doi.org/10.2478/v10127-010-0033-6.
Full textKuznetsov, A. A., A. V. Potii, N. A. Poluyanenko, and I. V. Stelnik. "Nonlinear complication functions for symmetric stream ciphers." Radiotekhnika, no. 195 (December 28, 2018): 125–37. http://dx.doi.org/10.30837/rt.2018.4.195.12.
Full textA. Baker, Shatha, and Ahmed S. Nori. "Comparison of the Randomness Analysis of the Modified Rectangle Block Cipher and Original algorithm." NTU Journal of Pure Sciences 1, no. 2 (May 31, 2022): 10–21. http://dx.doi.org/10.56286/ntujps.v1i2.185.
Full textBakunina, O. V., N. M. Balandina, and A. V. Sokolov. "Synthesis method for s-boxes based on galois field transform matrices." Ukrainian Journal of Information Technology 5, no. 2 (2023): 41–48. http://dx.doi.org/10.23939/ujit2023.02.041.
Full textВамболь, Олексій Сергійович. "ВДОСКОНАЛЕНА ПОЛІНОМІАЛЬНО-СКЛАДНА АТАКА ВІДНОВЛЕННЯ ВІДКРИТОГО ТЕКСТУ НА РАНЦЕВИЙ ШИФР НА ОСНОВІ МАТРИЦЬ." RADIOELECTRONIC AND COMPUTER SYSTEMS, no. 3 (September 28, 2020): 67–74. http://dx.doi.org/10.32620/reks.2020.3.07.
Full textR, Elumalai, and G. S. G. N. Anjaneyulu. "3Revised Paper: A Modified Wei-Hua-He Digital Signature Scheme Based on Factoring and Discrete Logarithm." Symmetry 14, no. 11 (November 17, 2022): 2443. http://dx.doi.org/10.3390/sym14112443.
Full textMourouzis, Theodosis, and Nicolas Courtois. "Hypothesis testing and advanced distinguishers in differential cryptanalysis of block ciphers." Tatra Mountains Mathematical Publications 64, no. 1 (September 1, 2015): 217–31. http://dx.doi.org/10.1515/tmmp-2015-0050.
Full textZahid, Amjad, Muhammad Arshad, and Musheer Ahmad. "A Novel Construction of Efficient Substitution-Boxes Using Cubic Fractional Transformation." Entropy 21, no. 3 (March 5, 2019): 245. http://dx.doi.org/10.3390/e21030245.
Full textLing, Qing, Tingting Cui, Hongtao Hu, Sijia Gong, Zijun He, Jiali Huang, and Jia Xiao. "Finding Impossible Differentials in ARX Ciphers under Weak Keys." IACR Transactions on Symmetric Cryptology 2024, no. 1 (March 1, 2024): 326–56. http://dx.doi.org/10.46586/tosc.v2024.i1.326-356.
Full textKang, Yongze, Qingyuan Yu, Lingyue Qin, and Guoyan Zhang. "Meet-in-the-Middle Differential Fault Analysis on ITUbee Block Cipher." Symmetry 15, no. 6 (June 2, 2023): 1196. http://dx.doi.org/10.3390/sym15061196.
Full textShestakov, V. S., A. M. Popov, and A. M. Kukartsev. "ABOUT THE DIRECT OPERATIONAL ANALYSIS OF SYMMETRIC CIPHERS." Prikladnaya diskretnaya matematika, no. 2 (December 1, 2008): 45–49. http://dx.doi.org/10.17223/20710410/2/10.
Full textKuznetsov, A. A., A. V. Potii, N. A. Poluyanenko, and I. V. Stelnik. "NONLINEAR FUNCTIONS OF COMPLICATION FOR SYMMETRIC STREAM CIPHERS." Telecommunications and Radio Engineering 78, no. 9 (2019): 743–458. http://dx.doi.org/10.1615/telecomradeng.v78.i9.10.
Full textMalviya, Ashwini Kumar, Namita Tiwari, and Meenu Chawla. "Quantum cryptanalytic attacks of symmetric ciphers: A review." Computers and Electrical Engineering 101 (July 2022): 108122. http://dx.doi.org/10.1016/j.compeleceng.2022.108122.
Full textBabenko, L. K., and Е. А. Tolomanenko. "HYBRID ENCRYPTION BASED ON SYMMETRIC AND HOMOMORPHIC CIPHERS." IZVESTIYA SFedU. ENGINEERING SCIENCES, no. 2 (July 1, 2021): 6–18. http://dx.doi.org/10.18522/2311-3103-2021-2-6-18.
Full textDolgov, V. I., I. V. Lisitska, and K. Yе Lisitskyi. "THE NEW CONCEPT OF BLOCK SYMMETRIC CIPHERS DESIGN." Telecommunications and Radio Engineering 76, no. 2 (2017): 157–84. http://dx.doi.org/10.1615/telecomradeng.v76.i2.60.
Full textFridrich, Jiri. "Symmetric Ciphers Based on Two-Dimensional Chaotic Maps." International Journal of Bifurcation and Chaos 08, no. 06 (June 1998): 1259–84. http://dx.doi.org/10.1142/s021812749800098x.
Full textKuznetsov, Alexandr, Lukasz Wieclaw, Nikolay Poluyanenko, Lukasz Hamera, Sergey Kandiy, and Yelyzaveta Lohachova. "Optimization of a Simulated Annealing Algorithm for S-Boxes Generating." Sensors 22, no. 16 (August 14, 2022): 6073. http://dx.doi.org/10.3390/s22166073.
Full textKuznetsov, О. О., М. О. Poluyanenko, S. O. Kandiy, and O. I. Peliukh. "Study of a new cost function for generating random substitutions of symmetric ciphers." Radiotekhnika, no. 209 (June 24, 2022): 71–82. http://dx.doi.org/10.30837/rt.2022.2.209.07.
Full textEjaz, Aisha, Ijaz Ali Shoukat, Umer Iqbal, Abdul Rauf, and Afshan Kanwal. "A secure key dependent dynamic substitution method for symmetric cryptosystems." PeerJ Computer Science 7 (July 19, 2021): e587. http://dx.doi.org/10.7717/peerj-cs.587.
Full textIshchukova, Evgenia, Ekaterina Maro, and Pavel Pristalov. "Algebraic Analysis of a Simplified Encryption Algorithm GOST R 34.12-2015." Computation 8, no. 2 (May 28, 2020): 51. http://dx.doi.org/10.3390/computation8020051.
Full textAlsariera, Yazan Ahmad. "Detecting block ciphers generic attacks: An instance-based machine learning method." International Journal of ADVANCED AND APPLIED SCIENCES 9, no. 5 (May 2022): 60–68. http://dx.doi.org/10.21833/ijaas.2022.05.007.
Full textEl-hajj, Mohammed, Hussien Mousawi, and Ahmad Fadlallah. "Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform." Future Internet 15, no. 2 (January 30, 2023): 54. http://dx.doi.org/10.3390/fi15020054.
Full textUzuner, Hakan, and Elif Bilge Kavun. "NLU-V: A Family of Instruction Set Extensions for Efficient Symmetric Cryptography on RISC-V." Cryptography 8, no. 1 (February 29, 2024): 9. http://dx.doi.org/10.3390/cryptography8010009.
Full textSalkanovic, Alen, Sandi Ljubic, Ljubisa Stankovic, and Jonatan Lerga. "Analysis of Cryptography Algorithms Implemented in Android Mobile Application." Information Technology and Control 50, no. 4 (December 16, 2021): 786–807. http://dx.doi.org/10.5755/j01.itc.50.4.29464.
Full textКuznetsov, О. О., Yu І. Gorbenko, І. М. Bilozertsev, А. V. Аndrushkevych, and О. P. Narizhnyi. "ALGEBRAIC IMMUNITY OF NON-LINEAR BLOCKS OF SYMMETRIC CIPHERS." Telecommunications and Radio Engineering 77, no. 4 (2018): 309–25. http://dx.doi.org/10.1615/telecomradeng.v77.i4.30.
Full textJoo, Min-Kyu, and Yoon-Hwa Choi. "A fault-tolerant pipelined architecture for symmetric block ciphers." Computers & Electrical Engineering 31, no. 6 (September 2005): 380–90. http://dx.doi.org/10.1016/j.compeleceng.2005.07.003.
Full textRuhil, Ankit, Dr Manjot Kaur Bhatia, and Pooja kumari. "SLIM: A Lightweight Block Cipher for Internet of Health Things." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (December 31, 2022): 370–81. http://dx.doi.org/10.22214/ijraset.2022.47879.
Full textDatta, Nilanjan, Shreya Dey, Avijit Dutta, and Sougata Mandal. "Cascading Four Round LRW1 is Beyond Birthday Bound Secure." IACR Transactions on Symmetric Cryptology 2023, no. 4 (December 8, 2023): 365–90. http://dx.doi.org/10.46586/tosc.v2023.i4.365-390.
Full text