Hybrid Model in the Block Cipher Applications for High-speed Communications Networks
暂无分享,去创建一个
Manh Cong Tran | Bac Do Thi | Minh Nguyen Hieu | Canh Hoang Ngoc | Phan Duong Phuc | Khoa Nguyen Tuan
[1] Seokhie Hong,et al. Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H , 2004, INDOCRYPT.
[2] Naixue Xiong,et al. Cryptanalysis of the XO-64 Suitable for Wireless Systems , 2017, Wirel. Pers. Commun..
[3] Pham Manh Tuan,et al. New Block Ciphers for Wireless Moblile Netwoks , 2016 .
[4] Seokhie Hong,et al. Related-Key Amplified Boomerang Attacks on KT-64 and MD-64 Suitable for Wireless Sensor Networks , 2013 .
[5] N.D. Goots,et al. Fast DDP-based ciphers: from hardware to software , 2003, 2003 46th Midwest Symposium on Circuits and Systems.
[6] Daniel G. Costa,et al. Cryptography in Wireless Multimedia Sensor Networks: A Survey and Research Directions , 2017, Cryptogr..
[7] Tong Li,et al. Lightweight Cryptographic Techniques for Automotive Cybersecurity , 2018, Wirel. Commun. Mob. Comput..
[8] Sangjin Lee,et al. A Chosen Plaintext Linear Attack on Block Cipher CIKS-1 , 2002, ICICS.
[9] Nguyen Hieu Minh,et al. KT-64: A New Block Cipher Suitable to Efficient FPGA Implementation , 2010 .
[10] Christian Rechberger,et al. New Rigorous Analysis of Truncated Differentials for 5-round AES , 2018, IACR Cryptol. ePrint Arch..
[11] N.H. Minh,et al. Design and estimate of a new fast block cipher for wireless communication devices , 2008, 2008 International Conference on Advanced Technologies for Communications.
[12] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[13] N. Sklavos,et al. Minimum size primitives for efficient VLSI implementation of DDO-based ciphers , 2004, Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.04CH37521).
[14] Nikolay A. Moldovyan,et al. New Class of Cryptographic Primitives and Cipher Design for Networks Security , 2006, Int. J. Netw. Secur..
[15] Bac Do Thi,et al. High-Speed Block Cipher Algorithm Based on Hybrid Method , 2014 .
[16] Seokhie Hong,et al. Distinguishing attack on SDDO-based block cipher BMD-128 , 2014 .
[17] Seokhie Hong,et al. Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1 , 2004, ACISP.
[18] Changhoon Lee,et al. Cryptanalysis on SDDO-Based BM123-64 Designs Suitable for Various IoT Application Targets , 2018, Symmetry.
[19] Nguyen Hieu Minh,et al. New SDDO-Based Block Cipher for Wireless Sensor Network Security , 2010 .
[20] Bac Do Thi,et al. An Effective and Secure Cipher Based on SDDO , 2012 .
[21] Seokhie Hong,et al. Linear Cryptanalysis of SPECTR-H64 with Higher Order Differential Property , 2003, MMM-ACNS.
[23] Jie Wu. Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks , 2005 .
[24] Nikolay A. Moldovyan,et al. Fast Encryption Algorithm Spectr-H64 , 2001, MMM-ACNS.
[25] K. M. S. Soyjaudah,et al. Analytical Comparison of Cryptographic Techniques for Resource-constrained Wireless Security , 2009, Int. J. Netw. Secur..
[26] Ashok M. Sapkal,et al. An efficient AES implementation using FPGA with enhanced security features , 2020 .
[27] Jinkeon Kang,et al. Related-Key Attack on the MD-64 Block Cipher Suitable for Pervasive Computing Environments , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.
[28] Nikolay A. Moldovyan,et al. A cipher based on data-dependent permutations , 2001, Journal of Cryptology.
[29] Nikolay A. Moldovyan. On Cipher Design Based on Switchable Controlled Operations , 2003, Int. J. Netw. Secur..
[30] Bac Do Thi,et al. A High Speed Block Cipher Algorithm , 2013 .