[HTML][HTML] Report on the development of the Advanced Encryption Standard (AES)

J Nechvatal, E Barker, L Bassham, W Burr… - Journal of research of …, 2001 - ncbi.nlm.nih.gov
Abstract In 1997, the National Institute of Standards and Technology (NIST) initiated a
process to select a symmetric-key encryption algorithm to be used to protect sensitive …

A lightweight authenticated encryption scheme based on chaotic scml for railway cloud service

Q Zheng, X Wang, MK Khan, W Zhang, BB Gupta… - IEEE …, 2017 - ieeexplore.ieee.org
In recent years, intelligent railway operation and maintenance using cloud technology have
received wide consideration for the provision of public transport services. Under the cloud …

[图书][B] Modern Cryptography Protect your data with fast block CIPHERS

N Goots, B Izotov, A Moldovyan, N Moldovyan - 2003 - books.google.com
Covering the specific issues related to developing fast block ciphers using software and
hardware implementation, this book provides a general picture of modern cryptography …

Cryptanalysis of a chaotic block cryptographic system against template attacks

Y Luo, S Zhang, J Liu, L Cao - International Journal of Bifurcation …, 2020 - World Scientific
The security of chaotic cryptographic system can be theoretically evaluated by using
conventional statistical tests and numerical simulations, such as the character frequency …

Cryptanalysis of chaos-based cryptosystem from the hardware perspective

Y Luo, D Zhang, J Liu, Y Liu, Y Cao… - International Journal of …, 2018 - World Scientific
Chaos has been used in cryptography for years and many chaotic cryptographic systems
have been proposed. Their securities are often evaluated by conducting conventional …

A block cryptographic algorithm for wireless sensor networks based on hybrid chaotic map

Y Luo, L Yao, J Liu, D Zhang… - 2019 IEEE 21st …, 2019 - ieeexplore.ieee.org
Nodes in Wireless Sensor Networks (WSNs) have limitations in terms of computing speed,
storage space and energy consumption. There are some drawbacks in existing algorithms …

Fast encryption algorithm SPECTR-H64

ND Goots, AA Moldovyan, NA Moldovyan - Information Assurance in …, 2001 - Springer
Fast Encryption Algorithm Spectr-H64 Page 1 VI Gorodetski et al. (Eds.): MMM-ACNS 2001,
LNCS 2052, pp. 275– 286, 2001. © Springer-Verlag Berlin Heidelberg 2001 Fast Encryption …

Cryptographic algorithms to secure networks-A technical survey on research perspectives

V Rojasree, J Gnanajayanthi - 2020 third international …, 2020 - ieeexplore.ieee.org
Cryptology-the art of secret writing is a branch of science with the fundamental objective as
“To enable people to communicate securely over a public insecure channel”. Cryptology …

Controlled elements for designing ciphers suitable to efficient VLSI implementation

AA Moldovyan, NA Moldovyan, N Sklavos - Telecommunication Systems, 2006 - Springer
This work considers the problem of increasing the performance of the ciphers based on Data-
Dependent (DD) operations (DDO) for VLSI implementations. New minimum size primitives …

A New Modified MARS Cryptosystem Based on Niho Exponent with an Enhanced S-Box Generation

F Ahmed, DH Elkamchouchi - Electronics, 2022 - mdpi.com
As an essential cryptological element, symmetric-key block ciphers have long been utilized
to offer information security. Even though they were created to provide data confidentiality …