نتایج جستجو برای: box key

تعداد نتایج: 632676  

Journal: :I. J. Network Security 2009
Yusuf Kurniawan Adang Suwandi A. M. Sukrisno Mardiyanto Iping Supriana Sarwono Sutikno

In this paper, we propose a new block cipher called BC2 (Block Cipher 2). We make a cipher using components that are believed secure. The structure of BC2 is very simple. We use Feistel network with input-output 128 bits, matrix Maximum Distance Separable (MDS) 8x8 with branch number 9 to give high diffusion, a function affine equivalent to the inverse function in GF(2) that we get from Camelli...

2006
Rong Du Colin Boyd Ernest Foo

There is fundamental difference between a simple e-tender box and a traditional physical tender box. Access to the e-tender box has become a private activity in contrast with the public access to a traditional tender box. A significant opportunity is therefore created for malicious business collusion by use of a simple e-tender box even though it may have cryptographic keys. This indicates that...

2009
Benoît Libert Damien Vergnaud

At Crypto’07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption as a convenient tool to reduce the amount of trust in authorities in Identity-Based Encryption. In this model, if the Private Key Generator (PKG) maliciously re-distributes users’ decryption keys, it runs the risk of being caught and prosecuted. Goyal proposed two constructions: the first one is effici...

2016
Jian Guo Jérémy Jean Ivica Nikolić Kexin Qiao Yu Sasaki Siang Meng Sim

We present an invariant subspace attack on the block cipher Midori64, proposed at Asiacrypt 2015. Our analysis shows that Midori64 has a class of 232 weak keys. Under any such key, the cipher can be distinguished with only a single chosen query, and the key can be recovered in 216 time with two chosen queries. As both the distinguisher and the key recovery have very low complexities, we confirm...

2010
Ajay Kakkar

*Thapar University, Patiala, India **GNDU, Amritsar, India Ex-Principal, MIMIT, Malout, India Abstract: Cryptography is a technique used to avoid unauthorized access of data. It is the technique of scrambling data to make it indecipherable to all, except the intended person. It includes encryption algorithm and reliable key(s). It is clear that key design flaws account for 50 percent of securit...

2007
Jianhong Xu Howard M. Heys

In this paper, we examine the security of the class of substitution-permutation private-key block ciphers with respect to linear and diierential crypt-analysis. A new S-box nonlinearity criterion is proposed and it is shown that S-boxes satisfying this criterion and having good diiusion improve remarkably the ability of an SPN to resist linear cryptanalysis and diierential cryptanalysis.

Journal: :international journal of horticultural science and technology 2015
mohsen ashrfai mohammad farsi amin mirshamsi mozhgan parvandi

many recent studies have shown that glycosylation patterns of agaricus bisporus are similar to those of mammalians, so that this organism is a good candidate for the expression of glycosylated pharmaceutical protein. to achieve constant interested gene expression in all cells of the organism, proper promoter isolation is necessary. to isolate this promoter, pcr with specific primers was perform...

Journal: :Journal of biomedical science 2006
Margaret S Ho Pei-I Tsai Cheng-Ting Chien

The eukaryotic protein degradation pathway involves the ubiquitin (Ub) modification of substrates targeted for degradation by the 26S proteasome. The addition of Ub, a process called ubiquitination, is mediated by enzymes including the E3 Ub ligases which transfer the Ub to targeted substrates. A major type of E3 Ub ligases, the SCF (Skp-Cullin-F-box) complex, is composed of four major componen...

Journal: :Science translational medicine 2010
Daniel A Peterson Peter J Turnbaugh

Once Pandora unlocked her fateful box and liberated the evil forces within, it became impossible to put them back. Now, new work on Crohn's disease suggests the existence of a viral "key" that irreversibly renders a genetically susceptible mouse prone to pathogenesis. Indeed, dangerous liaisons among host genotype, viral infection, intestinal injury, and trillions of gut microbes may in part de...

2013
Eman Mohammed Mahmoud Ahmed Abd El Hafez Talaat A. Elgarf

Advanced Encryption Standard (AES) block cipher system is widely used in cryptographic applications. The main core of AES block cipher is the substitution table or SBox. This S-box is used to provide confusion capability for AES. The aim of this paper is to design dynamic S-box which depends on the secret key. The parameters of the new created SBOXes have characteristics equal to those in the o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید