Zobrazeno 1 - 10
of 105
pro vyhledávání: '"Enes Pasalic"'
Publikováno v:
IET Information Security, Vol 2023 (2023)
Since their introduction in early 2000, CPA (correlation power analysis), as a cryptographic tool, has been widely used in the cryptanalysis of cryptographic algorithms (being applicable to both symmetric key ciphers as well as to public key encrypti
Externí odkaz:
https://doaj.org/article/27db98be683143c1bbc26f80cfa1bdac
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 18 (2022)
Lightweight ciphers are often used as the underlying encryption algorithm in resource-constrained devices. Their cryptographic security is a mandatory goal for ensuring the security of data transmission. Differential cryptanalysis is one of the most
Externí odkaz:
https://doaj.org/article/bf35ed7fadf8415aa62ca27a2c307a68
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2019, Iss 4 (2020)
In this paper, a new method for evaluating the integral property, truncated and impossible differentials for substitution-permutation network (SPN) block ciphers is proposed. The main assumption is an explicit description/expression of the internal s
Externí odkaz:
https://doaj.org/article/f3636b8a8052467dae3e42088b377cc4
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2018, Iss 4 (2018)
The nonlinear invariant attack was introduced at ASIACRYPT 2016 by Todo et al.. The attack has received extensive attention of cryptographic community due to its practical application on the full-round block ciphers SCREAM, iSCREAM, and Midori64. How
Externí odkaz:
https://doaj.org/article/b90bec6c3ec042d7b8aa073f877512d9
Publikováno v:
IEEE Transactions on Information Theory. 69:2702-2712
Publikováno v:
Cryptography and Communications. 15:487-512
Publikováno v:
Designs, Codes and Cryptography. 91:373-389
Autor:
Sadmir Kudin, Enes Pasalic
Publikováno v:
Designs, Codes and Cryptography. 90:1783-1796
Publikováno v:
Designs, Codes and Cryptography. 90:1289-1318
Publikováno v:
Designs, Codes and Cryptography.
During the last five decades, many different secondary constructions of bent functions were proposed in the literature. Nevertheless, apart from a few works, the question about the class inclusion of bent functions generated using these methods is ra