2007
DOI: 10.1201/9781420054125
|View full text |Cite
|
Sign up to set email alerts
|

Data-driven Block Ciphers for Fast Telecommunication Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
17
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(17 citation statements)
references
References 0 publications
0
17
0
Order By: Relevance
“…intermediate algorithms and provides results obtained during the algorithm development. 166 transform due to the fact that wavelets can capture frequency as well as location-in-time information about the analyzed waveform or image [11]. In fact transform domain techniques have been shown to hold better to decryption attempts and attacks [12], [13].…”
Section: Testingmentioning
confidence: 99%
“…intermediate algorithms and provides results obtained during the algorithm development. 166 transform due to the fact that wavelets can capture frequency as well as location-in-time information about the analyzed waveform or image [11]. In fact transform domain techniques have been shown to hold better to decryption attempts and attacks [12], [13].…”
Section: Testingmentioning
confidence: 99%
“…The in [12], Moldovyan N.A described SDDO using Hawk 64 cipher based on minimum controlled element F 2/1 . Next, on the basic of symmetry topology of CSPN, it is very easy for us to build SDDO, which is the combination of active layers L i and the fixed permutation j [10]. The general structure of SDDO is presented in figure 1.…”
Section: The Structure Of Sddomentioning
confidence: 99%
“…However, [10] also point out the weakness of non-use of that key change process. That is the existence of weak key layers, which mean that it will reduce security of the ciphering algorithm.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…2. Each one of these ciphertext based on sequential rounds as in TwoFish (Feistelcategories includes other algorithms of similar based) [3] and AES (Non-Feistel-based) [4]. Generally, block properties.…”
mentioning
confidence: 99%