RH Makarim, C Tezcan - … workshop on lightweight cryptography for security …, 2014 - Springer
Recently it was observed that for a particular nonzero input difference to an S-Box, some bits in all the corresponding output differences may remain invariant. These specific invariant …
Printed documents are still relevant in our daily life and information in it must be protected from threats and attacks such as forgery, falsification or unauthorized modification. Such …
C Estébanez, Y Saez, G Recio… - Computational …, 2014 - Wiley Online Library
Noncryptographic hash functions have an immense number of important practical applications owing to their powerful search properties. However, those properties critically …
Abstract In 1994, Peter Shor published a quantum algorithm capable of factoring large integers and computing discrete logarithms in Abelian groups in polynomial time. Since …
Dealing with digital medical images is raising many new security problems with legal and ethical complexities for local archiving and distant medical services. These include image …
We present a method to iteratively construct new bent functions of n+ 2 variables from a bent function of n variables and its cyclic shift permutations using minterms of n variables and …
D Hong, D Kwon - IEICE Transactions on Fundamentals of …, 2014 - search.ieice.org
We give some attacks on the DBL hash modes MDC-4 and MJH. Our preimage attack on the MDC-4 hash function requires the time complexity O (2 3n/2) for the block length n of the …
İ Sertkaya, A Doğanaksoy, O Uzunkol… - International Workshop on …, 2014 - Springer
We first give a proof of an isomorphism between the group of affine equivalent maps and the automorphism group of Sylvester Hada-mard matrices. Secondly, we prove the existence of …
Collect and analyse threat models to the Bitcoin ecosystem and its software. The create misuse case, attack trees, and sequence diagrams of the threats. Create a malicious client …