Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Wei-Zhu Yeoh"'
Publikováno v:
IEEE Access, Vol 9, Pp 104205-104216 (2021)
One of the main security requirements for symmetric-key block ciphers is resistance against differential cryptanalysis. This is commonly assessed by counting the number of active substitution boxes (S-boxes) using search algorithms or mathematical so
Externí odkaz:
https://doaj.org/article/4fc812a4efc341078ddaa81c213e7f7f
Publikováno v:
Information Security and Privacy ISBN: 9783030553036
ACISP
ACISP
In this paper, we propose a GPU-accelerated branch-and-bound algorithm. The proposed approach substantially increases the performance of the differential cluster search. We were able to derive a branch enumeration and evaluation kernel that is 5.95 t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8006a827f4a44d0fd566f001b9bd10ca
https://doi.org/10.1007/978-3-030-55304-3_9
https://doi.org/10.1007/978-3-030-55304-3_9
Publikováno v:
Lecture Notes in Electrical Engineering ISBN: 9789811500572
This paper presents a 64-bit lightweight block cipher, µ2 with a key size of 80-bit. µ2 is designed based on well-established design paradigms, achieving comparable performance and security when compared against existing state-of-the-art lightweigh
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::10f1386d093f00201d3ea3ea3ecb0d96
https://doi.org/10.1007/978-981-15-0058-9_27
https://doi.org/10.1007/978-981-15-0058-9_27
Publikováno v:
Journal of Information Security and Applications. 65:103087
Publikováno v:
Multimedia Tools and Applications. 78:15929-15949
True random number generators are used in high security applications such as cryptography where non-determinism is required. However, they are slower than their pseudorandom counterparts because they need to extract entropy from physical phenomenon.
Publikováno v:
Multimedia Tools & Applications; Jun2019, Vol. 78 Issue 12, p15929-15949, 21p
Autor:
Joseph K. Liu, Hui Cui
This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP 2020, held in Perth, WA, Australia, in November 2020•. The 31 revised full papers and 5 short papers presented were carefu
This book gathers the proceedings of the Sixth International Conference on Computational Science and Technology 2019 (ICCST2019), held in Kota Kinabalu, Malaysia, on 29–30 August 2019. The respective contributions offer practitioners and researcher