2
3
4
Paar, Christof
2024
Table of Contents:
“...Introduction to Cryptography and Data Security -- Stream Ciphers -- The Data Encryption Standard (DES) and Alternatives -- The Advanced Encryption Standard (AES) -- More About Block Ciphers -- Introduction to Public-Key Cryptography -- The RSA...”2024
Full text
5
De Feo, Luca
2023
Table of Contents:
“... F_p^n via Multiple Local Maps -- Poseidon2: A Faster Version of the Poseidon Hash Function -- From Unbalanced to Perfect: Implementation of Low Energy Stream Ciphers -- Cryptanalysis -- The special case of cyclotomic fields in quantum algorithms for unit...”2023
Full text
6
Deng, Yi
2023
Table of Contents:
“... -- Stream ciphers -- Higher-Order Masking Scheme for Trivium Hardware Implementation -- An Experimentally Verified Attack on 820-Round Trivium -- Malware -- HinPage: Illegal and Harmful Webpage Identification Using Transductive Classification -- Detecting API...”2023
Full text
7
Deng, Jing
2023
Table of Contents:
“... Banners Conveying User's Desired Opt-Out Decisions? An Empirical Study of Cookie Consent Banners -- MPC with Cards -- Upper Bounds on the Number of Shuffl for Two-Helping-Card Multi-Input AND Protocols -- Free-XOR in Card-based Garbled Circuits -- Hidden Stream...”2023
Full text
8
Table of Contents:
“... Sharing -- New Results on Distributed Secret Sharing Protocols -- Probabilistic Fingerprinting Scheme for Correlated Data -- Optimized stream-cipher-based transciphering by means of functional-bootstrapping -- Applications 1 -- Control is Nothing Without Trust...”
Full text
Full text
9
Giri, Debasis
2023
Table of Contents:
“...Verifiable Delay Function Based on Non-linear Hybrid Cellular Automata -- Security Analysis of WG-7 Lightweight Stream Cipher against Cube Attack -- MILP Modeling of S-Box: Divide and Merge Approach -- A Relation between Properties of S-Box and Linear...”2023
Full text
10
11
Guo, Fuchun
2022
Table of Contents:
“...Symmetric-Key Cryptography -- Key Structures: Improved Related-Key Boomerang Attack against the Full AES-256 -- Truncated Differential Properties of the Diagonal Set of Inputs for 5-round AES -- PNB-focused Differential Cryptanalysis of ChaCha Stream...”2022
Full text
12
Musa, Sarhan M.
2022
Table of Contents:
“... -- 6.6.3 Differential Cryptanalysis vs. Linear Cryptanalysis -- 6.7 Multiple Des -- 6.7.1 Double DES -- 6.7.2 Triple DES -- 6.7.3 Block Cipher vs. Stream Cipher -- 6.7.4 Block/Stream Cipher Modes of Operation -- 6.8 International Data Encryption Algorithm (IDEA...”2022
Full text
13
14
Nagabhushan, P.
2021
Table of Contents:
“... Histogram Shifting Based Reversible Data Hiding Technique In Encrypted Images -- Security of Digital Images Based on Stream Cipher and MDS Matrix -- Retinal Vessel Segmentation using Joint Relative Entropy Thresholding on Bowler Hat Transform -- Semantic...”2021
Full text
15
Bandini, Stefania
2021
Table of Contents:
“... from Cellular Automata -- EnCash: an Authenticated Encryption scheme using Cellular Automata -- High Order Cellular Automata for Edge Detection: a Preliminary Study -- PENTAVIUM - Potent Trivium-like Stream Cipher Using Higher Radii Cellular Automata...”2021
Full text
16
17
Oppliger, Rolf
2021
Table of Contents:
“... OF A PRF -- 8.3 RELATIONSHIP BETWEEN PRGs AND PRFs -- 8.3.1 PRF-Based PRG -- 8.3.2 PRG-Based PRF -- 8.4 RANDOM ORACLE MODEL -- 8.5 FINAL REMARKS -- References -- Chapter 9 Symmetric Encryption -- 9.1 INTRODUCTION -- 9.1.1 Block and Stream Ciphers -- 9.1.2...”2021
Full text
18
19
Mandal, J. K.
2021
Table of Contents:
“... array (FPGA) based Programmable Logic Controllers (PLC) -- Automated Monitoring and Regulation of User Friendly Greenhouse using Arduino -- An Involution Function Based Symmetric Stream Cipher -- Multi-Objective Optimization of Block Size based on CPU Power...”2021
Full text
20
Giri, Debasis
2021
Table of Contents:
“... Cellular Automata -- Anonymous Fine-Grained User Access Control Scheme for Internet of Things Architecture -- Preventing Fault Attack on Stream Ciphers by Fault Detection and Correction -- A Guests Managing System with Lattice-based Verifier-local Revocation...”2021
Full text