On time-memory trade-offs for password hashing schemes

AN Saran - Frontiers in Computer Science, 2024 - frontiersin.org
A password hashing algorithm is a cryptographic method that transforms passwords into a
secure and irreversible format. It is used not only for authentication purposes but also for key …

Cryptographic randomness testing of block ciphers and hash functions

A Doğanaksoy, B Ege, O Koçak, F Sulak - Cryptology ePrint Archive, 2010 - eprint.iacr.org
One of the most basic properties expected from block ciphers and hash functions is passing
statistical randomness testing, as they are expected to behave like random mappings …

Advanced encryption standard based on key dependent S‐Box cube

A Seghier, J Li, DZ Sun - IET Information Security, 2019 - Wiley Online Library
The advanced encryption standard (AES) is the most encryption algorithm used around the
world. This fact made it coveted by several cryptanalysis attacks. Some of them succeed to …

Statistical analysis of block ciphers and hash functions

F Sulak - 2011 - open.metu.edu.tr
One of the most basic properties expected from block ciphers and hash functions is passing
statistical randomness testing, as they are supposed to behave like random mappings …

[PDF][PDF] 基于密文随机性度量值分布特征的分组密码算法识别方案

吴杨, 王韬, 邢萌, 李进东 - 通信学报, 2015 - infocomm-journal.com
在研究现有加密算法识别方案局限性的基础上, 提出了基于密文随机性度量值分布特征的分组
密码算法识别方案. 首先, 基于码元频数检测, 块内频数检测及游程检测对AES, Camellia, DES …

On statistical analysis of synchronous stream ciphers

M Sönmez Turan - 2008 - open.metu.edu.tr
Synchronous stream ciphers constitute an important class of symmetric ciphers. After the call
of the eSTREAM project in 2004, 34 stream ciphers with different design approaches were …

The research of cryptosystem recognition based on randomness test's return value

Z Zhao, Y Zhao, F Liu - Cloud Computing and Security: 4th International …, 2018 - Springer
Feature extraction of ciphertext is a key procedure in cryptosystem recognition task. Varieties
of ciphertext's features are proposed in exited literatures, while feature based on …

Implementation of Proposed Cryptography Algorithm on ESP32-Based IoT System

LC Ni, S Ali, ANAA Aziz… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
This research explores the data security of the Internet of Things (IoT), with a specific focus
on designing cryptographic algorithms suitable for the resource-constrained ESP32 …

Design of Cryptography Algorithm for Data Security of a IoT System

LC Ni, S Ali, RA Rashid - 2024 IEEE International Conference …, 2024 - ieeexplore.ieee.org
This research explores the data security of the Internet of Things (IoT), with a specific focus
on designing cryptographic algorithms suitable for the resource-constrained ESP32 …

Time memory trade off attack on symmetric ciphers

AN Saran - 2009 - open.metu.edu.tr
Time Memory Trade O (TMTO) is a cryptanalytic method that aims to develop an attack
which has a lower memory complexity than lookup table and a lower online time complexity …