Semantic Scholar uses AI to extract papers important to this topic.
With the rapid technological growth in the present context, Internet of Things (IoT) has attracted the worldwide attention and… Expand Abstract Several modes of operation have been built upon block cipher security. Among them, CFB is considered to be one of the… Expand Cryptography is the first line of defense to protect the data from intruder. Symmetric cryptography and asymmetric cryptography… Expand East African Nubi has classic attributes of a creole — it was formed in a short period of time and its structure diverges… Expand In this paper, we discuss the different authentication techniques suitable for severely constrained nodes in wireless sensor… Expand Knudsen and Rijmen introduced the notion of known-key distinguishers in an effort to view block cipher security from an… Expand Abstract
Despite their widespread usage in block cipher security, linear and differential cryptanalysis still lack a robust… Expand In this paper we examine a class of product ciphers referred to as substitution-permutation networks. We investigate the… Expand This study describes historical observations and future estimates of the discharge regime of the river Meuse, with reference to… Expand