We analyze the security of the two-dimensional circulation encryption algorithm (TDCEA), recently published by Chen et al. in this journal. We show that there are several flaws in the algorithm and describe some attacks. We also address performance issues in current cryptographic designs.status: publishe
Side-channel analysis is an important concern for the security of cryptographic implementations, and...
Symmetric key cryptography is one of the cornerstones of security in the modern era of electronic co...
A large number of services today are built around processing data that is collected from or shared b...
Recently, a new signal security system called TDCEA (two-dimensional circulation encryption algorith...
Recently, a new signal security system called TDCEA (two-dimensional circulation encryption algorith...
Abstract- In recent years, many multimedia and image encryption techniques based on chaotic maps hav...
Abstract. CTC is a toy cipher designed in order to assess the strength of algebraic attacks. While t...
This paper analyzes the security of the image encryption algorithm based on a two-dimensional (2D) i...
Block ciphers are widely used building blocks for secure communication systems; their purpose is to...
© 2017 World Scientific Publishing Company. As a variant of the substitution-permutation network, th...
A new symmetric block cipher algorithm called AL02 has been developed. The algorithm scheme provides...
CTC is a toy cipher designed by Courtois in order to prove the strength of algebraic attacks. In thi...
CS-Cipher is a block cipher which has been proposed at FSE 1998. It is a Markov cipher in which diff...
A large number of services today are built around processing data that is collected from or shared b...
The AES algorithm is a symmetric block cipher, which will replace DES for the next few decades. This...
Side-channel analysis is an important concern for the security of cryptographic implementations, and...
Symmetric key cryptography is one of the cornerstones of security in the modern era of electronic co...
A large number of services today are built around processing data that is collected from or shared b...
Recently, a new signal security system called TDCEA (two-dimensional circulation encryption algorith...
Recently, a new signal security system called TDCEA (two-dimensional circulation encryption algorith...
Abstract- In recent years, many multimedia and image encryption techniques based on chaotic maps hav...
Abstract. CTC is a toy cipher designed in order to assess the strength of algebraic attacks. While t...
This paper analyzes the security of the image encryption algorithm based on a two-dimensional (2D) i...
Block ciphers are widely used building blocks for secure communication systems; their purpose is to...
© 2017 World Scientific Publishing Company. As a variant of the substitution-permutation network, th...
A new symmetric block cipher algorithm called AL02 has been developed. The algorithm scheme provides...
CTC is a toy cipher designed by Courtois in order to prove the strength of algebraic attacks. In thi...
CS-Cipher is a block cipher which has been proposed at FSE 1998. It is a Markov cipher in which diff...
A large number of services today are built around processing data that is collected from or shared b...
The AES algorithm is a symmetric block cipher, which will replace DES for the next few decades. This...
Side-channel analysis is an important concern for the security of cryptographic implementations, and...
Symmetric key cryptography is one of the cornerstones of security in the modern era of electronic co...
A large number of services today are built around processing data that is collected from or shared b...