These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
113 related articles for article (PubMed ID: 37095966)
1. On the resistance of new lightweight block ciphers against differential cryptanalysis. Chan YY; Khor CY; Khoo BT; Teh JS; Teng WJ; Jamil N Heliyon; 2023 Apr; 9(4):e15257. PubMed ID: 37095966 [TBL] [Abstract][Full Text] [Related]
2. Dynamic Rounds Chaotic Block Cipher Based on Keyword Abstract Extraction. Wang J; Ding Q Entropy (Basel); 2018 Sep; 20(9):. PubMed ID: 33265782 [TBL] [Abstract][Full Text] [Related]
3. Breaking Trivium Stream Cipher Implemented in ASIC Using Experimental Attacks and DFA. Potestad-Ordóñez FE; Valencia-Barrero M; Baena-Oliva C; Parra-Fernández P; Jiménez-Fernández CJ Sensors (Basel); 2020 Dec; 20(23):. PubMed ID: 33287234 [TBL] [Abstract][Full Text] [Related]
4. Fruit-80: A Secure Ultra-Lightweight Stream Cipher for Constrained Environments. Amin Ghafari V; Hu H Entropy (Basel); 2018 Mar; 20(3):. PubMed ID: 33265271 [TBL] [Abstract][Full Text] [Related]
6. Breaking Data Encryption Standard with a Reduced Number of Rounds Using Metaheuristics Differential Cryptanalysis. Dworak K; Boryczka U Entropy (Basel); 2021 Dec; 23(12):. PubMed ID: 34946003 [TBL] [Abstract][Full Text] [Related]
7. A Novel Binary Hybrid PSO-EO Algorithm for Cryptanalysis of Internal State of RC4 Cipher. Rizk-Allah RM; Abdulkader H; Elatif SSA; Elkilani WS; Al Maghayreh E; Dhahri H; Mahmood A Sensors (Basel); 2022 May; 22(10):. PubMed ID: 35632252 [TBL] [Abstract][Full Text] [Related]
8. A Lightweight Cipher Based on Salsa20 for Resource-Constrained IoT Devices. Lara E; Aguilar L; García JA; Sanchez MA Sensors (Basel); 2018 Oct; 18(10):. PubMed ID: 30287774 [TBL] [Abstract][Full Text] [Related]
9. BRISK: Dynamic Encryption Based Cipher for Long Term Security. Dwivedi AD Sensors (Basel); 2021 Aug; 21(17):. PubMed ID: 34502635 [TBL] [Abstract][Full Text] [Related]
10. Block Cipher's Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knight's Tour Chain. Khan MF; Saleem K; Shah T; Hazzazi MM; Bahkali I; Shukla PK Comput Intell Neurosci; 2022; 2022():8338508. PubMed ID: 35634082 [TBL] [Abstract][Full Text] [Related]
11. A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis. Azimi SA; Ranea A; Salmasizadeh M; Mohajeri J; Aref MR; Rijmen V Des Codes Cryptogr; 2022; 90(8):1797-1855. PubMed ID: 35813599 [TBL] [Abstract][Full Text] [Related]
12. On the Fitness Functions Involved in Genetic Algorithms and the Cryptanalysis of Block Ciphers. Tito-Corrioso O; Borges-Quintana M; Borges-Trenard MA; Rojas O; Sosa-Gómez G Entropy (Basel); 2023 Jan; 25(2):. PubMed ID: 36832626 [TBL] [Abstract][Full Text] [Related]
14. Optimization of a Simulated Annealing Algorithm for S-Boxes Generating. Kuznetsov A; Wieclaw L; Poluyanenko N; Hamera L; Kandiy S; Lohachova Y Sensors (Basel); 2022 Aug; 22(16):. PubMed ID: 36015833 [TBL] [Abstract][Full Text] [Related]
15. Differential cryptanalysis of a medical image cryptosystem with multiple rounds. Chen L; Wang S Comput Biol Med; 2015 Oct; 65():69-75. PubMed ID: 26298487 [TBL] [Abstract][Full Text] [Related]
16. A lightweight security framework for electronic healthcare system. Chaudhary RRK; Chatterjee K Int J Inf Technol; 2022; 14(6):3109-3121. PubMed ID: 35912035 [TBL] [Abstract][Full Text] [Related]
17. Security Analysis of the Image Encryption Algorithm Based on a Two-Dimensional Infinite Collapse Map. Shi G; Yu S; Wang Q Entropy (Basel); 2022 Jul; 24(8):. PubMed ID: 35893003 [TBL] [Abstract][Full Text] [Related]
18. Secure Quaternion Feistel Cipher for DICOM Images. Dzwonkowski M; Rykaczewski R IEEE Trans Image Process; 2019 Jan; 28(1):371-380. PubMed ID: 30183633 [TBL] [Abstract][Full Text] [Related]
19. A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map. Ali A; Khan MA; Ayyasamy RK; Wasif M PeerJ Comput Sci; 2022; 8():e940. PubMed ID: 35634109 [TBL] [Abstract][Full Text] [Related]
20. Algebraic Persistent Fault Analysis of SKINNY_64 Based on S_Box Decomposition. Fang X; Zhang H; Wang D; Yan H; Fan F; Shu L Entropy (Basel); 2022 Oct; 24(11):. PubMed ID: 36359601 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]