نتایج جستجو برای: box key

تعداد نتایج: 632676  

Journal: :دراسات الادب المعاصر 0
محمدحسن أمرایی طالب الدکتوراه فی قسم اللغة العربیة وآدابها بجامعة الرازی.

youssef ismael – iraqi great artist – is one of the nobles in playwriting either in writing or in criticism. al – aani has enjoyed beresht’s theories and ideas while his idea were based on political requirements which was dominant in that era; he wanted to choose a frame for playwriting which considered all types of people of the society. the present article which is analytical – descriptive, s...

Kooroush Manochehri Sahar Darvish Motevali

One of the major cipher symmetric algorithms is AES. Its main feature is to use S-BOX step, which is the only non-linear part of this standard possessing fixed structure. During the previous studies, it was shown that AES standard security was increased by changing the design concepts of S-BOX and production of dynamic S-BOX. In this paper, a change of AES standard security is studied by produc...

Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...

2011
Gabriela Moise

In cryptography, a Substitution box (S-box) is one of the basic components of a symmetric key cryptography. Generally, it transforms a number of m input bits into n output bits. In this paper, there are presented the cryptographic properties of S-boxes and it is introduced a knowledge-based schema for building S-boxes.

2013
Dragan Lambić Miodrag Živković Žarko Mijajlović

Random bijective S-box generation methods are considered. An alternative S-box generation method by forming compositions of permutations from some fixed set is proposed. Experiments show that the rate of acceptable S-boxes for all the methods considered is essentially the same. The advantage of the composition method is an obvious parametrization, with the potentially large key space.

2017
M. Zobeiri

In modern cryptography, the P-Boxes and S-boxes are used to make the relation between the plaintext and the cipher text difficult to realize. P-Box is a tool that changes the order of the input bits and they appear in the output. In this case, the key is order transmission of input bits in output bits.An S-box is a basic component which performs substitution. In this paper, a new method for the...

Journal: :Journal of Biomedical Science 2006

2001
Lars R. Knudsen

In this note we analyse Noekeon, a 128-bit block cipher submitted to the NESSIE project. It is shown that for six of seven S-boxes which satisfy the design criteria of the Noekeon designers the resulting block ciphers are vulnerable to either a differential attack, a linear attack or both. One conclusion is that Noekeon is not designed according to the wide trail strategy. Also, it is shown tha...

Journal: :CoRR 2012
Sohail Abid Shahid Abid

This paper presents modifications of the Diffie-Hellman (DH) key exchange method. The presented modifications provide better security than other key exchange methods. We are going to present a dynamic security that simultaneously realizes all the three functions with a high efficiency and then give a security analysis. It also presents secure and dynamic key exchange method. Signature, encrypti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید