Ara
Toplam kayıt 4, listelenen: 1-4
Cipher with AES
(IEEE, 2018)
After the DES (Data Encryption Standart) algorithm was unreliable, a content was held in September 1997 by the US National Institude of Standards and Technology (NEST) to designate a cryptographic algorithm for national ...
Classifying 8-bit to 8-bit S-boxes based on power mappings from the point of DDT and LAT distributions
(Springer-Verlag Berlin, 2008)
S-boxes are vital elements in the design of symmetric ciphers. To date, the techniques for the construction of S-boxes have included pseudo-random generation, finite field inversion, power mappings and heuristic techniques. ...
Fixing distortions on images
(Institute of Electrical and Electronics Engineers Inc., 2020)
People have long desired editing the defects on images and, removing or altering the corrupt regions of image data in a way that would not be detected by the neutral observer unaware of the original copy. Utilizing computers ...
On the algebraic expression of the AES S-box like S-boxes
(2010)
In the literature, there are several proposed block ciphers like AES, Square, Shark and Hierocrypt which use S-boxes that are based on inversion mapping over a finite field. Because of the simple algebraic structure of ...