1
Cryptology and Network Security with Machine Learning [E-Book] : Proceedings of ICCNSML 2023 /
2
Cryptocoding Based on Quasigroups [E-Book] /
3
Cryptology and Network Security with Machine Learning [E-Book] : Proceedings of ICCNSML 2022 /
4
Understanding Cryptography [E-Book] : From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms /
Table of Contents: ...Introduction to Cryptography and Data Security -- Stream Ciphers -- The Data Encryption Standard (DES) and Alternatives -- The Advanced Encryption Standard (AES) -- More About Block Ciphers -- Introduction to Public-Key Cryptography -- The RSA...

Full text 
5
Progress in Cryptology - AFRICACRYPT 2023 [E-Book] : 14th International Conference on Cryptology in Africa, Sousse, Tunisia, July 19-21, 2023, Proceedings /
Table of Contents: ... F_p^n via Multiple Local Maps -- Poseidon2: A Faster Version of the Poseidon Hash Function -- From Unbalanced to Perfect: Implementation of Low Energy Stream Ciphers -- Cryptanalysis -- The special case of cyclotomic fields in quantum algorithms for unit...

Full text 
6
Data and Applications Security and Privacy XXXVII [E-Book] : 37th Annual IFIP WG 11.3 Conference, DBSec 2023, Sophia-Antipolis, France, July 19-21, 2023, Proceedings /
Table of Contents: ... Sharing -- New Results on Distributed Secret Sharing Protocols -- Probabilistic Fingerprinting Scheme for Correlated Data -- Optimized stream-cipher-based transciphering by means of functional-bootstrapping -- Applications 1 -- Control is Nothing Without Trust...

Full text 
7
Proceedings of the Ninth International Conference on Mathematics and Computing [E-Book] : ICMC 2023 /
Table of Contents: ...Verifiable Delay Function Based on Non-linear Hybrid Cellular Automata -- Security Analysis of WG-7 Lightweight Stream Cipher against Cube Attack -- MILP Modeling of S-Box: Divide and Merge Approach -- A Relation between Properties of S-Box and Linear...

Full text 
8
Information Security and Cryptology [E-Book] : 18th International Conference, Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected Papers /
Deng, Yi
2023
Table of Contents: ... -- Stream ciphers -- Higher-Order Masking Scheme for Trivium Hardware Implementation -- An Experimentally Verified Attack on 820-Round Trivium -- Malware -- HinPage: Illegal and Harmful Webpage Identification Using Transductive Classification -- Detecting API...

Full text 
9
Cryptology and Network Security [E-Book] : 22nd International Conference, CANS 2023, Augusta, GA, USA, October 31 - November 2, 2023, Proceedings /
Deng, Jing
2023
Table of Contents: ... Banners Conveying User's Desired Opt-Out Decisions? An Empirical Study of Cookie Consent Banners -- MPC with Cards -- Upper Bounds on the Number of Shuffl for Two-Helping-Card Multi-Input AND Protocols -- Free-XOR in Card-based Garbled Circuits -- Hidden Stream...

Full text 
10
Information Security and Privacy [E-Book] : 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings /
Table of Contents: ...Symmetric-Key Cryptography -- Key Structures: Improved Related-Key Boomerang Attack against the Full AES-256 -- Truncated Differential Properties of the Diagonal Set of Inputs for 5-round AES -- PNB-focused Differential Cryptanalysis of ChaCha Stream...

Full text 
11
Selected Areas in Cryptography [E-Book] : 28th International Conference, Virtual Event, September 29 - October 1, 2021, Revised Selected Papers /
12
Network Security and Cryptography [E-Book]
Table of Contents: ... -- 6.6.3 Differential Cryptanalysis vs. Linear Cryptanalysis -- 6.7 Multiple Des -- 6.7.1 Double DES -- 6.7.2 Triple DES -- 6.7.3 Block Cipher vs. Stream Cipher -- 6.7.4 Block/Stream Cipher Modes of Operation -- 6.8 International Data Encryption Algorithm (IDEA...

Full text 
13
Stream Ciphers in Modern Real-time IT Systems [E-Book] : Analysis, Design and Comparative Studies /
14
Computer Vision and Image Processing [E-Book] : 5th International Conference, CVIP 2020, Prayagraj, India, December 4-6, 2020, Revised Selected Papers, Part I /
Table of Contents: ... Histogram Shifting Based Reversible Data Hiding Technique In Encrypted Images -- Security of Digital Images Based on Stream Cipher and MDS Matrix -- Retinal Vessel Segmentation using Joint Relative Entropy Thresholding on Bowler Hat Transform -- Semantic...

Full text 
15
Design and Cryptanalysis of ZUC [E-Book] : A Stream Cipher in Mobile Telephony /
16
Cellular Automata [E-Book] : 14th International Conference on Cellular Automata for Research and Industry, ACRI 2020, Lodz, Poland, December 2-4, 2020, Proceedings /
Table of Contents: ... from Cellular Automata -- EnCash: an Authenticated Encryption scheme using Cellular Automata -- High Order Cellular Automata for Edge Detection: a Preliminary Study -- PENTAVIUM - Potent Trivium-like Stream Cipher Using Higher Radii Cellular Automata...

Full text 
17
Cryptography 101 : From Theory to Practice [E-Book]
Table of Contents: ... OF A PRF -- 8.3 RELATIONSHIP BETWEEN PRGs AND PRFs -- 8.3.1 PRF-Based PRG -- 8.3.2 PRG-Based PRF -- 8.4 RANDOM ORACLE MODEL -- 8.5 FINAL REMARKS -- References -- Chapter 9 Symmetric Encryption -- 9.1 INTRODUCTION -- 9.1.1 Block and Stream Ciphers -- 9.1.2...

Full text 
18
Selected Areas in Cryptography [E-Book] : 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers /
19
Proceedings of the Fourth International Conference on Microelectronics, Computing and Communication Systems [E-Book] : MCCS 2019 /
Table of Contents: ... array (FPGA) based Programmable Logic Controllers (PLC) -- Automated Monitoring and Regulation of User Friendly Greenhouse using Arduino -- An Involution Function Based Symmetric Stream Cipher -- Multi-Objective Optimization of Block Size based on CPU Power...

Full text 
20
Proceedings of the Fifth International Conference on Mathematics and Computing [E-Book] : ICMC 2019 /
Table of Contents: ... Cellular Automata -- Anonymous Fine-Grained User Access Control Scheme for Internet of Things Architecture -- Preventing Fault Attack on Stream Ciphers by Fault Detection and Correction -- A Guests Managing System with Lattice-based Verifier-local Revocation...

Full text