Search Results - "block cipher"

  • Showing 1 - 12 results of 12
Refine Results
  1. 1
  2. 2
  3. 3

    Partition-Based Trapdoor Ciphers

    Published 2017
    Subjects: “…cryptography, cryptanalysis, block ciphers, substitution-permutation network, backdoor…”
    DOAB: download the publication
    DOAB: description of the publication
    Electronic Book Chapter
  4. 4
  5. 5

    Entropy in Real-World Datasets and Its Impact on Machine Learning

    Published 2023
    Subjects: “…symmetric block ciphers…”
    DOAB: download the publication
    DOAB: description of the publication
    Electronic Book Chapter
  6. 6

    Side Channel Attacks by Hong, Seokhie

    Published 2019
    Subjects: “…tweakable block cipher…”
    DOAB: download the publication
    DOAB: description of the publication
    Electronic Book Chapter
  7. 7
  8. 8

    The Joy of Cryptography by Rosulek, Mike

    Published 2021
    Table of Contents: “…0 Review of Concepts & Notation -- 1 One-Time Pad & Kerckhoffs' Principle -- 2 The Basics of Provable Security -- 3 Secret Sharing -- 4 Basing Cryptography on Intractable Computations -- 5 Pseudorandom Generators -- 6 Pseudorandom Functions & Block Ciphers -- 7 Security Against Chosen Plaintext Attacks -- 8 Block Cipher Modes of Operation -- 9 Chosen Ciphertext Attacks -- 10 Message Authentication Codes -- 11 Hash Functions -- 12 Authenticated Encryption & AEAD -- 13 RSA & Digital Signatures -- 14 Diffie-Hellman Key Agreement -- 15 Public-Key Encryption…”
    Access online version
    Electronic eBook
  9. 9
  10. 10

    Security of Ubiquitous Computing Systems Selected Topics /

    Published 2021
    Table of Contents: “…Part I: Introduction -- Emerging Security Challenges for Ubiquitous Devices -- Part II: Lightweight Cryptographic Primitives -- Catalog and Illustrative Examples of Lightweight Cryptographic Primitives -- Selected Design and Analysis Techniques in Contemporary Symmetric Encryption -- An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families -- Part III: Authentication Protocols -- ePassport and eID Technologies -- Ultra-lightweight Authentication -- From Relay Attacks to Distance-Bounding Protocols -- Part IV: Hardware Implementation and Systems -- It Started With Templates: The Future of Profiling in Side-Channel Analysis -- Side Channel Attack Assessment Platforms and Tools for Ubiquitous Systems -- Challenges in Certifying Small-scale (IoT) Hardware Random Number Generators -- Finding Software Bugs in Embedded Devices -- Part V: Privacy and Forensics -- Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach -- IoT Forensics.…”
    Link to Metadata
    Electronic eBook
  11. 11
  12. 12