نتایج جستجو برای: aes also

تعداد نتایج: 2403555  

Journal: :IACR Cryptology ePrint Archive 2011
Joan Boyar René Peralta

New techniques for reducing the depth of circuits for cryptographic applications are described and applied to the AES S-box. These techniques also keep the number of gates quite small. The result, when applied to the AES S-box, is a circuit with depth 16 and only 128 gates. For the inverse, it is also depth 16 and has only 127 gates. There is a shared middle part, common to both the S-box and i...

2003
Beomsik Song Jennifer Seberry

We present our further observations on the structure of the AES algorithm relating to the cyclic properties of the functions used in this cipher. We note that the maximal period of the linear layer of the AES algorithm is short, as previously observed by S. Murphy and M.J.B. Robshaw. However, we also note that when the non-linear and the linear layer are combined, the maximal period is dramatic...

2010
Yang Li Kazuo Sakiyama Shigeto Gomisawa Toshinori Fukunaga Junko Takahashi Kazuo Ohta

This paper proposes a new fault-based attack called the Fault Sensitivity Analysis (FSA) attack, which unlike most existing fault-based analyses including Differential Fault Analysis (DFA) does not use values of faulty ciphertexts. Fault sensitivity means the critical condition when a faulty output begins to exhibit some detectable characteristics, e.g., the clock frequency when fault operation...

Journal: :The National medical journal of India 2012
Rajnish Joshi S P Kalantri Arthur Reingold John M Colford

BACKGROUND Seasonal outbreaks of acute encephalitis syndrome (AES) occur with striking regularity in India and lead to substantial mortality. Several viruses, endemic in many parts of India, account for AES. Although Japanese encephalitis virus (JEV) is a key aetiological agent for AES in India, and has attracted countrywide attention, many recent studies suggest that enteroviruses and rhabdovi...

2015
Mehran Mozaffari-Kermani Mehran Mozaffari Kermani Mehran Mozaffari Amr M. Youssef Anestis Dounavis Hanan Lutfiyya Xianbin Wang

The high level of security and the fast hardware and software implementations of the Advanced Encryption Standard (AES) have made it the first choice for many critical applications. Since its acceptance as the adopted symmetric-key algorithm, the AES has been utilized in various security-constrained applications, many of which are power and resource constrained and require reliable and efficien...

2016
Mario E. Lacouture Brigitte Dréno Paolo Antonio Ascierto Reinhard Dummer Nicole Basset-Seguin Kate Fife Scott Ernst Lisa Licitra Rogerio I. Neves Ketty Peris Susana Puig Jonas Sokolof Aleksandar Sekulic Axel Hauschild Rainer Kunstfeld

Abnormal activation of hedgehog pathway signaling is a key driver in the pathogenesis of basal cell carcinoma (BCC). Vismodegib, a first-in-class small-molecule inhibitor of hedgehog pathway signaling, is approved by regulatory authorities for the treatment of adults who have metastatic BCC or locally advanced BCC that has recurred after surgery, or who are not candidates for surgery and who ar...

2014
Mona Dara Kooroush Manochehri

Advanced Encryption Standard (AES) block cipher system is widely used in cryptographic applications. Substitution boxes (S-boxes) are keystone of modern symmetric cryptosystems. They bring nonlinearity to cryptosystems and strengthen their cryptographic security. The S-box component that used in classic AES is fixed. If we generate this S-box dynamically, the cryptographic strength of AES ciphe...

Journal: :IET Information Security 2007
Liam Keliher Jiayuan Sui

The current standard approach to demonstrate provable security of a block cipher against differential and linear cryptanalysis is based on the maximum expected differential and linear probability (MEDP and MELP) over a sequence of core cipher rounds. Often information about these values for a small number of rounds leads to significant insights concerning the security of the cipher for larger n...

2013
Patrick Derbez Pierre-Alain Fouque

In this paper, we revisit Demirci and Selçuk meet-in-themiddle attacks on AES. We nd a way to automatically model SPN block cipher and meet-in-the-middle attacks that allows to perform exhaustive search of this kind of attacks. This search uses the tool developed by Bouillaguet, Derbez and Fouque at CRYPTO 2011 as a subroutine to solve speci c systems. We also take into account ideas introduced...

2007
Yusuke Tatsumi Yoichi Kumada Michimasa Kishimoto

Poster Title Page AES-1 Dynamical Analysis of Silver-Staining by Y. Tatsumi, Y. Kumada & M. Kishimoto 3 AES-2 Quantification And Control Of Passive Flows To Minimize Sample Losses At Channel Junctions by H. Xu, J. Paschkewitz, C. Park, & R. Bharadwaj 3 AES-3 Nanoparticle-Composite Gels for Protein Separation: Characterization Based on Acoustic Methods by H. Sedrick, J. Bollig, N. Burns, H. Stre...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید