Recovery-key attacks against TMN-family framework for mobile wireless networks
The proliferation of the Internet of Things (IoT) technologies and applications, especially the
rapid rise in the use of mobile devices, from individuals to organizations, has led to the …
rapid rise in the use of mobile devices, from individuals to organizations, has led to the …
[PDF][PDF] Related-Key Amplified Boomerang Attack on Full-Round MM-128
Recently, the use of open platforms with various network functions and hardware interfaces
has been increasing in various fields such as the Internet of Things, smart buildings, and …
has been increasing in various fields such as the Internet of Things, smart buildings, and …
Cryptanalysis of the XO-64 Suitable for Wireless Systems
Data-dependent operations (DDOs) that were introduced by Moldovyan in 2003 (Moldovyan
in MMM-ACNS 2003, LNCS, 2776: 316–327, Springer, Heidelberg, 5; Moldovyan et al. in Int …
in MMM-ACNS 2003, LNCS, 2776: 316–327, Springer, Heidelberg, 5; Moldovyan et al. in Int …
Cryptanalysis on SDDO-Based BM123-64 Designs Suitable for Various IoT Application Targets
BM123-64 block cipher, which was proposed by Minh, NH and Bac, DT in 2014, was
designed for high speed communication applications factors. It was constructed in hybrid …
designed for high speed communication applications factors. It was constructed in hybrid …
New block ciphers for wireless moblile netwoks
Abstract Wireless Mobile Networks (WMNs) play a fundamental role in the activities of each
individual and organization. However, they have a number of limitations about hardware …
individual and organization. However, they have a number of limitations about hardware …
Extending Network Security by Multi Model Encryption Standards for Dynamic Networks Using Fuzzy Logic Technique
K Vetrivel, MS Shanmugam… - Sri Padmavati Mahila …, 2018 - papers.ssrn.com
The modern internet technology paves the way for the network users to access various
services which can be accessed through mobile devices, PDA and many more. The loosely …
services which can be accessed through mobile devices, PDA and many more. The loosely …
[HTML][HTML] ArticlesRelated-Key Amplified Boomerang Attack on Full-Round MM-128
H Eom, B Seok, C Lee - hcisj.com
Recently, the use of open platforms with various network functions and hardware interfaces
has been increasing in various fields such as the Internet of Things, smart buildings, and …
has been increasing in various fields such as the Internet of Things, smart buildings, and …
Hybrid model in the block cipher applications for high-speed communications networks
MN Hieu - International Journal of Computer Networks & …, 2020 - papers.ssrn.com
The article proposes two different designs for the new block cipher algorithm of 128-bit block
size and key lengths of 128-bit or 192-bit or 256-bit. The basic cipher round is designed in a …
size and key lengths of 128-bit or 192-bit or 256-bit. The basic cipher round is designed in a …
Security analysis of SDDO-based block cipher for wireless sensor network
Switchable data-dependent operations (SDDOs) that were introduced by Moldovyan (MMM-
ACNS 2003, LNCS, vol 2776, pp 316–327. Springer, Heidelberg, 2003), have been …
ACNS 2003, LNCS, vol 2776, pp 316–327. Springer, Heidelberg, 2003), have been …
Statistical properties for sequence produced by pseudorandom number generator used in well-known stream cipher
Y Harmouch, R El Kouch - International Journal of Hybrid …, 2018 - content.iospress.com
The current article statistically analyzes several PRNG for well-known high-speed stream
ciphers. The study focuses on frequency detection, uniformity distribution alongside with …
ciphers. The study focuses on frequency detection, uniformity distribution alongside with …