Zobrazeno 1 - 10
of 125
pro vyhledávání: '"Cryptoanalysis"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Information, Vol 13, Iss 8, p 358 (2022)
Cryptography is the study and practice of secure communication with digital data and focuses on confidentiality, integrity, and authentication. Random number generators (RNGs) generate random numbers to enhance security. Even though the cryptographic
Externí odkaz:
https://doaj.org/article/c9afdcf104654cd3b6e85b5e31ac3f67
Autor:
Armel Dubois-Nayt, Valérie Nachef
Publikováno v:
Etudes Epistémè, Vol 37 (2020)
This article looks at Marie de Guise’s part in the development of ciphered writing in Scotland. Based on six surviving enciphered dispatches between the Regent of Scotland and the French ambassadors between 1553 and 1560, it analyses Guise’s incr
Externí odkaz:
https://doaj.org/article/efe3769fb25d4426b5d9f3dcd258c239
Autor:
Sergey A. Belov
Publikováno v:
Современные информационные технологии и IT-образование, Vol 14, Iss 3, Pp 586-593 (2018)
The work outlines the method of construction of round function as a polynomial of one variable over the finite field. The proposed method is based on the calculation of the initial cryptographic transformation at special points of the finite field an
Externí odkaz:
https://doaj.org/article/5209f85d365b4be69278553490d25d61
Autor:
Rixin Xu, Liehuang Zhu, An Wang, Xiaojiang Du, Kim-Kwang Raymond Choo, Guoshuang Zhang, Keke Gai
Publikováno v:
IEEE Access, Vol 6, Pp 58395-58404 (2018)
Side-channel attack is a known security risk to smart cards, and there have been efforts by smart card manufacturers to incorporate side-channel attack countermeasures. In this paper, we study a widely used smart card that uses the 3DES algorithm. Fi
Externí odkaz:
https://doaj.org/article/2860075af09f4910a99a292cde15a6c1
Autor:
Andrii Sahun, Vladyslav Khaidurov, Valeriy Lakhno, Ivan Opirskyy, Vitalii Chubaievskyi, Olena Kryvoruchko, Alona Desiatko
Publikováno v:
Eastern-European Journal of Enterprise Technologies, Vol 5, Iss 9 (113), Pp 17-29 (2021)
This paper analyzes ways to improve the cryptographic strength of the symmetric block cipher RC5. The task to enhance the stability of the classic RC5 cipher is explained by the fact that it is part of various open cryptographic libraries and is freq
Autor:
Vuković, Filip
Tijekom Prvog svjetskog rata korištene su brojne tada već poznate metode zakrivanja i raskrivanja poruka, dok je također osmišljen velik broj novih metoda. Stoga ovaj rad prikazuje stanje kriptologije i kriptografije te njihov razvoj za vrijeme P
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______9415::4ca38b8bd8cb20a632b68c768c948fbc
https://repozitorij.ffzg.unizg.hr/islandora/object/ffzg:6527/datastream/PDF
https://repozitorij.ffzg.unizg.hr/islandora/object/ffzg:6527/datastream/PDF
Autor:
Бублик, Єгор Iванович
Метою даної роботи пошук правил з множини одновимiрних клiтинних автоматiв з правилами радiусу 1 i 2 та порiвняльний аналiз схем їх поєднанн
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2635::c2916d0d90b78a6fb3fc53aa5a9747c5
https://ela.kpi.ua/handle/123456789/44078
https://ela.kpi.ua/handle/123456789/44078
Autor:
Roberto Narváez
Publikováno v:
Estudios de Historia Moderna y Contemporánea de México, Iss 41, Pp 119-133 (2011)
En este trabajo se ofrece una serie de análisis y comparaciones entre documentos de archivo y argumentos de índole criptológica e histórica para fortalecer, especialmente con ayuda del criptoanálisis técnico y el razonamiento por analogía, la
Externí odkaz:
https://doaj.org/article/67b5a6d1f3614734899d75a8f77004fb
Autor:
Tomas Ondrasina, Maria Franekova
Publikováno v:
Advances in Electrical and Electronic Engineering, Vol 8, Iss 3, Pp 78-83 (2010)
The paper deals with problems of safety and security principles within wireless industrial communication systems. First safety requirements to wireless industrial communication system, summarisation of attack methods and the available measures for ri
Externí odkaz:
https://doaj.org/article/418bb8f909884ebb804488f62cebe31b