To tackle with physical attacks to real world cryptosystems,leakage resilient cryptography was developed.In this setting, the adversary is allowed to have a
In the information era, more and more data are produced, which imposes a heavy burden on local storage.Fortunately, the cloud computing paradigm provides us
Key schedules in block ciphers are often highly simplified, which causes weakness that can be exploited in many attacks.At ASIACRYPT 2011, Dunkelman et al.p
Feistel-2 is a Feistel scheme proposed by Isobe and Shibutani in Asiacrypt 2013, in which the round functions are composed of an XOR of a subkey followed by
Boolean functions possessing multiple cryptographic criteria play an important role in the design of symmetric cryptosystems.The following criteria for cryp
The paper proposes a cubic chaotic mapping.Its bifurcation graph and Lyapunov exponent show that the mapping owns excellent chaotic properties.A chaos-based
This paper presents a digital speech encryption scheme based on symmetrical homomorphic encryption technique (MORE-method), in which a symmetrical key crypt