نتایج جستجو برای: gost2 block cipher

تعداد نتایج: 164470  

Journal: :International Journal of Security and Its Applications 2017

Journal: :Journal of Engineering and Applied Sciences 2019

Journal: :IACR Cryptology ePrint Archive 2014
Benjamin Buhrow Paul Riemer Mike Shea Barry K. Gilbert Erik S. Daniel

Embedded microcontroller applications often experience multiple limiting constraints: memory, speed, and for a wide range of portable devices, power. Applications requiring encrypted data must simultaneously optimize the block cipher algorithm and implementation choice against these limitations. To this end we investigate block cipher implementations that are optimized for speed and energy effi...

1993
Bart Preneel René Govaerts Joos Vandewalle

Constructions for hash functions based on a block cipher are studied where the size of the hashcode is equal to the block length of the block cipher and where the key size is approximately equal to the block length. A general model is presented, and it is shown that this model covers 9 schemes that have appeared in the literature. Within this general model 64 possible schemes exist, and it is s...

Journal: :International Journal of Computer Applications 2010

Journal: :Journal of the Korea Industrial Information Systems Research 2012

Journal: :Computer and Information Science 2010

Journal: :CoRR 2014
Ayman M. Bahaa Eldin

This thesis aims to use intelligent systems to extend and improve performance and security of cryptographic techniques. Genetic algorithms framework for cryptanalysis problem is addressed. A novel extension to the differential cryptanalysis using genetic algorithm is proposed and a fitness measure based on the differential characteristics of the cipher being attacked is also proposed. The compl...

Journal: :Des. Codes Cryptography 2001
Douglas R. Stinson

In this short note, we study all-or-nothing transforms, which were recently proposed by Rivest as a mode of operation for block ciphers. We study transforms of this type that provide unconditional security. A simple construction for linear transforms is given, and some existence and non-existence results for general transforms are derived from a combinatorial characterization of these objects.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید