Recovery-key attacks against TMN-family framework for mobile wireless networks

TSD Phuc, YH Shin, C Lee - KSII Transactions on Internet and …, 2021 - koreascience.kr
The proliferation of the Internet of Things (IoT) technologies and applications, especially the
rapid rise in the use of mobile devices, from individuals to organizations, has led to the …

[PDF][PDF] Related-Key Amplified Boomerang Attack on Full-Round MM-128

H Eom, B Seok, C Lee - HUMAN-CENTRIC COMPUTING AND …, 2023 - hcisj.com
Recently, the use of open platforms with various network functions and hardware interfaces
has been increasing in various fields such as the Internet of Things, smart buildings, and …

Cryptanalysis of the XO-64 Suitable for Wireless Systems

TSD Phuc, NN Xiong, C Lee - Wireless Personal Communications, 2017 - Springer
Data-dependent operations (DDOs) that were introduced by Moldovyan in 2003 (Moldovyan
in MMM-ACNS 2003, LNCS, 2776: 316–327, Springer, Heidelberg, 5; Moldovyan et al. in Int …

Cryptanalysis on SDDO-Based BM123-64 Designs Suitable for Various IoT Application Targets

TSD Phuc, C Lee - Symmetry, 2018 - mdpi.com
BM123-64 block cipher, which was proposed by Minh, NH and Bac, DT in 2014, was
designed for high speed communication applications factors. It was constructed in hybrid …

New block ciphers for wireless moblile netwoks

PM Tuan, B Do Thi, MN Hieu, N Do Thanh - International Conference on …, 2016 - Springer
Abstract Wireless Mobile Networks (WMNs) play a fundamental role in the activities of each
individual and organization. However, they have a number of limitations about hardware …

Extending Network Security by Multi Model Encryption Standards for Dynamic Networks Using Fuzzy Logic Technique

K Vetrivel, MS Shanmugam… - Sri Padmavati Mahila …, 2018 - papers.ssrn.com
The modern internet technology paves the way for the network users to access various
services which can be accessed through mobile devices, PDA and many more. The loosely …

[HTML][HTML] ArticlesRelated-Key Amplified Boomerang Attack on Full-Round MM-128

H Eom, B Seok, C Lee - hcisj.com
Recently, the use of open platforms with various network functions and hardware interfaces
has been increasing in various fields such as the Internet of Things, smart buildings, and …

Hybrid model in the block cipher applications for high-speed communications networks

MN Hieu - International Journal of Computer Networks & …, 2020 - papers.ssrn.com
The article proposes two different designs for the new block cipher algorithm of 128-bit block
size and key lengths of 128-bit or 192-bit or 256-bit. The basic cipher round is designed in a …

Security analysis of SDDO-based block cipher for wireless sensor network

TSD Phuc, C Lee - The Journal of Supercomputing, 2016 - Springer
Switchable data-dependent operations (SDDOs) that were introduced by Moldovyan (MMM-
ACNS 2003, LNCS, vol 2776, pp 316–327. Springer, Heidelberg, 2003), have been …

Statistical properties for sequence produced by pseudorandom number generator used in well-known stream cipher

Y Harmouch, R El Kouch - International Journal of Hybrid …, 2018 - content.iospress.com
The current article statistically analyzes several PRNG for well-known high-speed stream
ciphers. The study focuses on frequency detection, uniformity distribution alongside with …