M Gabr, H Younis, M Ibrahim, S Alajmy, I Khalid… - Symmetry, 2022 - mdpi.com
The need for information security has become urgent due to the constantly changing nature of the Internet and wireless communications, as well as the daily generation of enormous …
Cryptography is commonly used to secure communication and data transmission over insecure networks through the use of cryptosystems. A cryptosystem is a set of cryptographic …
This work proposes a novel image encryption algorithm that integrates unique image transformation techniques with the principles of chaotic and hyper-chaotic systems. By …
In this paper, we propose a new A uthenticated L ightweight E ncryption algorithm coined ALE. The basic operation of ALE is the AES round transformation and the AES-128 key …
L Li, B Liu, H Wang - Microprocessors and Microsystems, 2016 - Elsevier
We propose a new ultra-lightweight block cipher, QTL. The 64 bits block cipher QTL supports 64 and 128 bits keys. To solve the slow diffusion of the traditional Feistel-type …
P Junod, S Vaudenay - Selected Areas in Cryptography: 11th International …, 2005 - Springer
In this paper, we describe the design of a new family of block ciphers based on a Lai- Massey scheme, named FOX. The main features of this design, besides a very high security …
A Biryukov - Cryptology EPrint Archive, 2004 - eprint.iacr.org
In these lecture notes we survey the state of the art in symmetric key encryption, in particular in the block ciphers and stream ciphers area. The area of symmetric key encryption has …
Abstract Impossible Differential Cryptanalysis (IDC)[4] uses impossible differential characteristics to retrieve a subkey material for the first or the last several rounds of block …
Z Bin Faheem, A Ali, MA Khan, ME Ul‐Haq… - ETRI …, 2020 - Wiley Online Library
Highly dispersive S‐boxes are desirable in cryptosystems as nonlinear confusion sub‐ layers for resisting modern attacks. For a near optimal cryptosystem resistant to modern …