نتایج جستجو برای: serpent block cipher

تعداد نتایج: 165035  

Journal: :Des. Codes Cryptography 2001
Douglas R. Stinson

In this short note, we study all-or-nothing transforms, which were recently proposed by Rivest as a mode of operation for block ciphers. We study transforms of this type that provide unconditional security. A simple construction for linear transforms is given, and some existence and non-existence results for general transforms are derived from a combinatorial characterization of these objects.

2001
Howard M. Heys

In this paper, we examine a recently proposed mode of operation for block ciphers which we refer to as statistical cipher feedback (SCFB) mode. SCFB mode configures the block cipher as a keystream generator for use in a stream cipher such that it has the property of statistical self-synchronization, thereby allowing the stream cipher to recover from slips in the communications channel. Statisti...

Journal: :IEICE Transactions on Information and Systems 2021

Hirose, Kuwakado and Yoshida proposed a nonce-based authenticated encryption scheme Lae0 based on Lesamnta-LW in 2019. is block-cipher-based iterated hash function included the ISO/IEC 29192-5 lightweight hash-function standard. They also showed that satisfies both privacy authenticity if underlying block cipher pseudorandom permutation. Unfortunately, their result implies only about 64-bit sec...

Journal: :IACR Cryptology ePrint Archive 2008
Sandy Harris

This paper looks at the possibility of combining a block cipher and a stream cipher to get a strong hybrid cipher. It includes two specific proposals for combining AES-128 and RC4-128 to get a cipher that takes a 256-bit key and is significantly faster than AES-256, and arguably more secure. One is immune to algebraic attacks.

Journal: :The KIPS Transactions:PartC 2012

Journal: :International Journal of Computing 2019

Journal: :Security and Communication Networks 2019

2011
Gautham Sekar Nicky Mouha Vesselin Velichkov Bart Preneel

The block cipher XTEA, designed by Needham andWheeler, was published as a technical report in 1997. The cipher was a result of fixing some weaknesses in the cipher TEA (also designed by Wheeler and Needham), which was used in Microsoft’s Xbox gaming console. XTEA is a 64-round Feistel cipher with a block size of 64 bits and a key size of 128 bits. In this paper, we present meet-in-the-middle at...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید