Literatura académica sobre el tema "Symmetric ciphers"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Symmetric ciphers".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Symmetric ciphers"
Lysytska, Iryna, Kostiantyn Lysytskyi, Oleksii Nariezhnii y Tetiana Hrinenko. "The influence of S-boxes on the arrival of the cipher to the state of random substitution". Radioelectronic and Computer Systems, n.º 3 (29 de septiembre de 2023): 150–58. http://dx.doi.org/10.32620/reks.2023.3.12.
Texto completoJang, Kyungbae, Gyeongju Song, Hyunjun Kim, Hyeokdong Kwon, Hyunji Kim y Hwajeong Seo. "Efficient Implementation of PRESENT and GIFT on Quantum Computers". Applied Sciences 11, n.º 11 (23 de mayo de 2021): 4776. http://dx.doi.org/10.3390/app11114776.
Texto completoZhang, Ping. "Quantum Related-Key Attack Based on Simon’s Algorithm and Its Applications". Symmetry 15, n.º 5 (24 de abril de 2023): 972. http://dx.doi.org/10.3390/sym15050972.
Texto completoKaidalov, Dmytro, Roman Oliynykov y Oleksandr Kazymyrov. "A Method for Security Estimation of the Spn-Based Block Cipher Against Related-Key Attacks". Tatra Mountains Mathematical Publications 60, n.º 1 (1 de septiembre de 2014): 25–45. http://dx.doi.org/10.2478/tmmp-2014-0023.
Texto completoJang, Kyoungbae, Seungju Choi, Hyeokdong Kwon, Hyunji Kim, Jaehoon Park y Hwajeong Seo. "Grover on Korean Block Ciphers". Applied Sciences 10, n.º 18 (14 de septiembre de 2020): 6407. http://dx.doi.org/10.3390/app10186407.
Texto completoAhmed, Fatma y Dalia H. Elkamchouchi. "A New Modified MARS Cryptosystem Based on Niho Exponent with an Enhanced S-Box Generation". Electronics 11, n.º 15 (26 de julio de 2022): 2318. http://dx.doi.org/10.3390/electronics11152318.
Texto completoFaraoun, Kamel Mohammed. "On the semantic security of cellular automata based pseudo-random permutation using results from the Luby-Rackoff construction". Annales Universitatis Mariae Curie-Sklodowska, sectio AI – Informatica 15, n.º 1 (1 de enero de 2015): 21. http://dx.doi.org/10.17951/ai.2015.15.1.21-31.
Texto completoSaraiva, Daniel A. F., Valderi Reis Quietinho Leithardt, Diandre de Paula, André Sales Mendes, Gabriel Villarrubia González y Paul Crocker. "PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices". Sensors 19, n.º 19 (5 de octubre de 2019): 4312. http://dx.doi.org/10.3390/s19194312.
Texto completoHaryono, Wasis. "Comparison Encryption of How to Work Caesar Cipher, Hill Cipher, Blowfish and Twofish". Data Science: Journal of Computing and Applied Informatics 4, n.º 2 (31 de julio de 2020): 100–110. http://dx.doi.org/10.32734/jocai.v4.i2-4004.
Texto completoKuznetsov, A. A., V. O. Frolenko, E. S. Eremin y D. V. Ivanenko. "Investigation of cross-platform realizations of stream symmetric ciphers". Radiotekhnika, n.º 193 (15 de mayo de 2018): 94–106. http://dx.doi.org/10.30837/rt.2018.2.193.10.
Texto completoTesis sobre el tema "Symmetric ciphers"
Gustafson, Helen May. "Statistical analysis of symmetric ciphers". Thesis, Queensland University of Technology, 1996.
Buscar texto completoPenna, Lyta. "Implementation issues in symmetric ciphers". Thesis, Queensland University of Technology, 2002.
Buscar texto completoMirza, Fauzan ul-Haque. "Analysis of some modern symmetric ciphers". Thesis, Royal Holloway, University of London, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.271702.
Texto completoDawson, Edward Pyle. "Design and cryptanalysis of symmetric ciphers". Thesis, Queensland University of Technology, 1991.
Buscar texto completoHenricksen, Matthew. "Design, Implementation and Cryptanalysis of Modern Symmetric Ciphers". Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16055/1/Matt_Henricksen_Thesis.pdf.
Texto completoHenricksen, Matthew. "Design, Implementation and Cryptanalysis of Modern Symmetric Ciphers". Queensland University of Technology, 2005. http://eprints.qut.edu.au/16055/.
Texto completoČanda, Valér. "Scalable symmetric block ciphers based on group bases". [S.l.] : [s.n.], 2001. http://deposit.ddb.de/cgi-bin/dokserv?idn=962789755.
Texto completoSaran, Nurdan A. "Time Memory Trade Off Attack On Symmetric Ciphers". Phd thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/12610437/index.pdf.
Texto completoDistinguished Point Method and Rainbow Method. Finally, we discuss the adjustment of the parameters to achieve a high success rate. To support our theoretical framework, we also present empirical results of our analysis to actual ciphers.
May, Lauren Jeanette. "Design, analysis and implementation of symmetric block ciphers". Thesis, Queensland University of Technology, 2002.
Buscar texto completoMcKague, Matthew. "Design and Analysis of RC4-like Stream Ciphers". Thesis, University of Waterloo, 2005. http://hdl.handle.net/10012/1141.
Texto completoLibros sobre el tema "Symmetric ciphers"
The seventh and the first: The divine thread of the Torah. Jerusalem: Urim Publications, 2012.
Buscar texto completoMartin, Keith M. Symmetric Encryption. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0004.
Texto completoCapítulos de libros sobre el tema "Symmetric ciphers"
Manz, Olaf. "Symmetric Ciphers". En Encrypt, Sign, Attack, 19–51. Berlin, Heidelberg: Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-662-66015-7_2.
Texto completoMileva, Aleksandra, Vesna Dimitrova, Orhun Kara y Miodrag J. Mihaljević. "Catalog and Illustrative Examples of Lightweight Cryptographic Primitives". En Security of Ubiquitous Computing Systems, 21–47. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-10591-4_2.
Texto completoGebotys, Catherine H. "Symmetric Key Protocols Including Ciphers". En Security in Embedded Devices, 111–42. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-1-4419-1530-6_6.
Texto completoSarkar, Palash. "Generic Attacks on Symmetric Ciphers". En Information Security and Cryptology – ICISC 2006, 7. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11927587_2.
Texto completoSchmidt, Jörn-Marc y Marcel Medwed. "Countermeasures for Symmetric Key Ciphers". En Information Security and Cryptography, 73–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29656-7_5.
Texto completoKuznetsov, Alexandr Alexandrovich, Oleksandr Volodymyrovych Potii, Nikolay Alexandrovich Poluyanenko, Yurii Ivanovich Gorbenko y Natalia Kryvinska. "Stream Symmetric Cipher “Strumok”". En Stream Ciphers in Modern Real-time IT Systems, 467–516. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79770-6_16.
Texto completoBuell, Duncan. "Modern Symmetric Ciphers—DES and AES". En Undergraduate Topics in Computer Science, 123–47. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73492-3_9.
Texto completoČanda, Valér, Tran van Trung, Spyros Magliveras y Tamás Horváth. "Symmetric Block Ciphers Based on Group Bases". En Selected Areas in Cryptography, 89–105. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44983-3_7.
Texto completoKuznetsov, Alexandr Alexandrovich, Oleksandr Volodymyrovych Potii, Nikolay Alexandrovich Poluyanenko, Yurii Ivanovich Gorbenko y Natalia Kryvinska. "Analysis of Stream Modes for Block Symmetric Ciphers". En Stream Ciphers in Modern Real-time IT Systems, 65–98. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79770-6_5.
Texto completoKuznetsov, Alexandr Alexandrovich, Oleksandr Volodymyrovych Potii, Nikolay Alexandrovich Poluyanenko, Yurii Ivanovich Gorbenko y Natalia Kryvinska. "Comparison of Stream Modes in Block Symmetric Ciphers". En Stream Ciphers in Modern Real-time IT Systems, 99–110. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79770-6_6.
Texto completoActas de conferencias sobre el tema "Symmetric ciphers"
Digulescu, Mircea-Adrian. "Applications of SKREM-Like Symmetric Key Ciphers". En 10th International Conference on Information Technology Convergence and Services (ITCSE 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.110912.
Texto completoLisickiy, Konstantin, Iryna Lisickaya, Victor Dolgov y Kateryna Kuznetsova. "Random S-boxes in Symmetric Ciphers". En 2019 IEEE 2nd Ukraine Conference on Electrical and Computer Engineering (UKRCON). IEEE, 2019. http://dx.doi.org/10.1109/ukrcon.2019.8879986.
Texto completoKuznetsov, Alexandr, Inna Horkovenko, Olena Maliy, Nikita Goncharov, Tetiana Kuznetsova y Nikolaj Kovalenko. "Non-Binary Cryptographic Functions for Symmetric Ciphers". En 2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T). IEEE, 2020. http://dx.doi.org/10.1109/picst51311.2020.9467982.
Texto completoNishikawa, Naoki, Keisuke Iwai y Takakazu Kurokawa. "High-Performance Symmetric Block Ciphers on CUDA". En 2011 Second International Conference on Networking and Computing (ICNC). IEEE, 2011. http://dx.doi.org/10.1109/icnc.2011.40.
Texto completoCool, D. L. y A. D. Keromytis. "Conversion and proxy functions for symmetric key ciphers". En International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II. IEEE, 2005. http://dx.doi.org/10.1109/itcc.2005.115.
Texto completoKuznetsov, Olexandr, Yuriy Gorbenko y Ievgeniia Kolovanova. "Combinatorial properties of block symmetric ciphers key schedule". En 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T). IEEE, 2016. http://dx.doi.org/10.1109/infocommst.2016.7905334.
Texto completoGorbenko, Ivan, Alexandr Kuznetsov, Vladyslav Tymchenko, Yurii Gorbenko y Olena Kachko. "Experimental Studies Of The Modern Symmetric Stream Ciphers". En 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T). IEEE, 2018. http://dx.doi.org/10.1109/infocommst.2018.8632058.
Texto completoNariezhnii, Oleksii, Egor Eremin, Vladislav Frolenko, Kyrylo Chernov, Tetiana Kuznetsova y Iryna Chepurko. "Research of Statistical Properties of Stream Symmetric Ciphers". En 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T). IEEE, 2018. http://dx.doi.org/10.1109/infocommst.2018.8632138.
Texto completoKuznetsov, Alexandr, Vladislav Frolenko, Egor Eremin y Olga Zavgorodnia. "Research of cross-platform stream symmetric ciphers implementation". En 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT). IEEE, 2018. http://dx.doi.org/10.1109/dessert.2018.8409148.
Texto completoJasim, Khalid Fadhil y Imad Fakhri Al Shaikhli. "Comparative study of some symmetric ciphers in mobile systems". En 2014 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M). IEEE, 2014. http://dx.doi.org/10.1109/ict4m.2014.7020587.
Texto completoInformes sobre el tema "Symmetric ciphers"
Blaze, Matt, Whitfield Diffie, Ronald L. Rivest, Bruce Schneier y Tsutomu Shimomura. Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security. A Report by an Ad Hoc Group of Cryptographers and Computer Scientists. Fort Belvoir, VA: Defense Technical Information Center, marzo de 1996. http://dx.doi.org/10.21236/ada385264.
Texto completo