A multi-shape hybrid symmetric encryption algorithm to thwart attacks based on the knowledge of the used cryptographic suite
暂无分享,去创建一个
[1] Tyler Moore,et al. Measuring the Cost of Cybercrime , 2012, WEIS.
[2] O. M. Lyashuk. Highly efficient method of data protection based on multilayer hybrid encryption , 2014 .
[3] Zhongpeng Wang,et al. A Chaos-Based Encryption Scheme for DCT Precoded OFDM-Based Visible Light Communication Systems , 2016, J. Electr. Comput. Eng..
[4] Iqtadar Hussain,et al. A noise resistant symmetric key cryptosystem based on S8 S-boxes and chaotic maps , 2018, The European Physical Journal Plus.
[5] Rossouw von Solms,et al. From information security to cyber security , 2013, Comput. Secur..
[6] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[7] Hao He,et al. Physical layer signal encryption using digital chaos in OFDM-PON , 2015, 2015 10th International Conference on Information, Communications and Signal Processing (ICICS).
[8] Iqtadar Hussain,et al. An algorithm for the construction of substitution box for block ciphers based on projective general linear group , 2017 .
[9] Keting Jia,et al. Improved Single-Key Attacks on 9-Round AES-192/256 , 2014, FSE.
[10] Joo Yeon Cho,et al. Linear Cryptanalysis of Reduced-Round PRESENT , 2010, CT-RSA.
[11] Chenhui Jin,et al. Meet-in-the-middle attacks on 10-round AES-256 , 2016, Des. Codes Cryptogr..
[12] Kaisa Nyberg,et al. A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent , 2008, ICISC.
[13] Dengguo Feng,et al. Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing , 2005, IACR Cryptol. ePrint Arch..
[14] Jérémy Jean,et al. Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting , 2013, IACR Cryptol. ePrint Arch..
[15] Harpreet Singh,et al. Enhancing AES using Novel Block Key Generation Algorithm and Key Dependent S-boxes , 2016 .
[16] Bruce Schneier,et al. MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants , 2000, AES Candidate Conference.
[17] Alex Biryukov,et al. Related-Key Cryptanalysis of the Full AES-192 and AES-256 , 2009, ASIACRYPT.
[18] Andrey Bogdanov,et al. Biclique Cryptanalysis of the Full AES , 2011, ASIACRYPT.
[19] Tobias Kretschmer,et al. ICT and productivity: conclusions from the empirical literature , 2013, Inf. Econ. Policy.
[20] Abdelrahman Altigani,et al. Analyzing the Performance of the Advanced Encryption Standard Block Cipher Modes of Operation: Highlighting the National Institute of Standards and Technology Recommendations , 2016 .
[21] Christophe Clavier,et al. Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks , 2014, Cryptography and Communications.
[22] Kaisa Nyberg,et al. Multidimensional Linear Cryptanalysis of Reduced Round Serpent , 2008, ACISP.
[23] Iqtadar Hussain,et al. Construction of chaotic quantum magnets and matrix Lorenz systems S-boxes and their applications , 2018, Chinese Journal of Physics.
[24] Ing-Jer Huang,et al. NCPA: A Scheduling Algorithm for Multi-cipher and Multi-mode Reconfigurable Cryptosystem , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[25] Yiran Chen,et al. A novel chaos-based image encryption algorithm using DNA sequence operations , 2017 .
[26] Sattar Mirzakuchaki,et al. Breaking a novel image encryption scheme based on an improper fractional order chaotic system , 2015, Multimedia Tools and Applications.