Network traffic classification is an important tool for network administrators in enabling monitoring and service provisioning. Traditional techniques employed in classifying traffic do …
Y Wu, JP Noonan, SO Agaian - arXiv preprint arXiv:1103.5520, 2011 - arxiv.org
The quality of image encryption is commonly measured by the Shannon entropy over the ciphertext image. However, this measurement does not consider to the randomness of local …
F Sulak, A Doğanaksoy, M Uğuz, O Koçak - Discrete Applied Mathematics, 2019 - Elsevier
In this work, we classify all templates according to their periods and for each template we evaluate the exact probabilities using generating functions. Afterwards, we propose a new …
A Doğanaksoy, F Sulak, M Uğuz… - Mathematical …, 2015 - Wiley Online Library
Random sequences and random numbers constitute a necessary part of cryptography. Many cryptographic protocols depend on random values. Randomness is measured by …
Recently, many scholars have tried to design new security methods inspired by biological techniques, as DNA, Some of which are in the domains of cryptography and steganography …
The Internet is a medium with low security, so there is a real need for measures to guarantee data integrity and privacy in the networks and associated computer systems. Cryptography …
AH Al-Wattar, R Mahmod, ZA Zukarnain… - International Journal of …, 2015 - academia.edu
The use of key-dependent MixColumns can be regarded as one of the applied techniques for changing the quality of a cryptographic algorithm. This article explains one approach for …
AHS Al-Wattar, R Mahmod, ZA Zukarnain… - International Journal of …, 2015 - researchgate.net
Many scholars have attempted to use new methods inspired by DNA bio-techniques in the domains of cryptography and steganography. In this article, a new S-Box was designed …
A Kaminsky - Cryptology ePrint Archive, 2019 - eprint.iacr.org
A cryptographic function with a fixed-length output, such as a block cipher, hash function, or message authentication code (MAC), should behave as a random mapping. The mapping's …