Search Results - "block cipher"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer science 1
- Cooperating objects (Computer systems) 1
- Cryptography 1
- Cyber-Physical Systems 1
- Data and Information Security 1
- Data protection 1
- History of engineering & technology 1
- Information technology industries 1
- Mathematics 1
- Network security 1
- Programming Language 1
- Programming languages (Electronic computers) 1
- Security Science and Technology 1
- Security systems 1
-
1
-
2
-
3
Partition-Based Trapdoor Ciphers
Published 2017Subjects: “…cryptography, cryptanalysis, block ciphers, substitution-permutation network, backdoor…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
4
Interactions between Group Theory, Symmetry and Cryptology
Published 2020Subjects: “…block cipher…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
5
Entropy in Real-World Datasets and Its Impact on Machine Learning
Published 2023Subjects: “…symmetric block ciphers…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
6
Side Channel Attacks
Published 2019Subjects: “…tweakable block cipher…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
7
-
8
The Joy of Cryptography
Published 2021Table of Contents: “…0 Review of Concepts & Notation -- 1 One-Time Pad & Kerckhoffs' Principle -- 2 The Basics of Provable Security -- 3 Secret Sharing -- 4 Basing Cryptography on Intractable Computations -- 5 Pseudorandom Generators -- 6 Pseudorandom Functions & Block Ciphers -- 7 Security Against Chosen Plaintext Attacks -- 8 Block Cipher Modes of Operation -- 9 Chosen Ciphertext Attacks -- 10 Message Authentication Codes -- 11 Hash Functions -- 12 Authenticated Encryption & AEAD -- 13 RSA & Digital Signatures -- 14 Diffie-Hellman Key Agreement -- 15 Public-Key Encryption…”
Access online version
Electronic eBook -
9
-
10
Security of Ubiquitous Computing Systems Selected Topics /
Published 2021Table of Contents: “…Part I: Introduction -- Emerging Security Challenges for Ubiquitous Devices -- Part II: Lightweight Cryptographic Primitives -- Catalog and Illustrative Examples of Lightweight Cryptographic Primitives -- Selected Design and Analysis Techniques in Contemporary Symmetric Encryption -- An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families -- Part III: Authentication Protocols -- ePassport and eID Technologies -- Ultra-lightweight Authentication -- From Relay Attacks to Distance-Bounding Protocols -- Part IV: Hardware Implementation and Systems -- It Started With Templates: The Future of Profiling in Side-Channel Analysis -- Side Channel Attack Assessment Platforms and Tools for Ubiquitous Systems -- Challenges in Certifying Small-scale (IoT) Hardware Random Number Generators -- Finding Software Bugs in Embedded Devices -- Part V: Privacy and Forensics -- Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach -- IoT Forensics.…”
Link to Metadata
Electronic eBook -
11
-
12