set theoretic estimation
Recently Published Documents


TOTAL DOCUMENTS

23
(FIVE YEARS 1)

H-INDEX

9
(FIVE YEARS 0)

Author(s):  
Harold A. Sabbagh ◽  
R. Kim Murphy ◽  
Elias H. Sabbagh ◽  
Liming Zhou ◽  
Russell Wincheski

2014 ◽  
pp. 259-266
Author(s):  
Albert H. Carlson ◽  
Robert E. Hiromoto ◽  
Richard B. Wells

The security of block and product ciphers is considered using a set theoretic estimation (STE) approach to decryption. Known-ciphertext attacks are studied using permutation (P) and substitution (S) keys. The blocks are formed from two (2) alphabetic characters (meta-characters) where the applications of P and S upon the ASCII byte representation of each of the two characters are allowed to cross byte boundaries. The application of STE forgoes the need to employ chosen-plaintext or known-plaintext attacks.


2013 ◽  
Vol 46 (11) ◽  
pp. 748-756 ◽  
Author(s):  
S. Theodoridis ◽  
Y. Kopsinis ◽  
K. Slavakis ◽  
S. Chouvardas

2012 ◽  
Vol 11 (7) ◽  
pp. 2373-2381 ◽  
Author(s):  
Guillaume Fumat ◽  
Pascal Charge ◽  
Ahmed Zoubir ◽  
Daniele Fournier-Prunaret

Sign in / Sign up

Export Citation Format

Share Document