搜索结果: 1-15 共查到“substitution”相关记录119条 . 查询时间(0.078 秒)
Substitution Attacks against Message Authentication
Algorithm Substitution Attacks Authentication Mass Surveillance
2019/9/3
This work introduces Algorithm Substitution Attacks (ASAs) on message authentication schemes. In light of revelations concerning mass surveillance, ASAs were initially introduced by Bellare, Paterson ...
A Modified Simple Substitution Cipher With Unbounded Unicity Distance
finite-key unicity randomization
2019/6/4
The classic simple substitution cipher is modified by randomly inserting key-defined noise characters into the ciphertext in encryption which are ignored in decryption. Interestingly, this yields a fi...
Recently, the NIST launched a competition for lightweight cryptography and a large number of ciphers are expected to be studied and analyzed under this competition. Apart from the classical security, ...
Constructing TI-friendly Substitution Boxes using Shift-Invariant Permutations
Shift-invariant Threshold implementation Sbox
2018/11/7
The threat posed by side channels requires ciphers that can be efficiently protected in both software and hardware against such attacks. In this paper, we proposed a novel Sbox construction based on i...
Wide Tweakable Block Ciphers Based on Substitution-Permutation Networks: Security Beyond the Birthday Bound
substitution-permutation networks tweakable block ciphers domain extension of block ciphers
2018/5/28
Substitution-Permutation Networks (SPNs) refer to a family of constructions which build a wnwn-bit (tweakable) block cipher from nn-bit public permutations. Many widely deployed block ciphers are part...
Salt substitution is a promising but unproven intervention for stroke management
Salt substitution promising stroke management
2018/11/20
In this issue of the Journal, Pan et al. (1) report beneficial effects on recovery after stroke with 6 mo of the postacute use of a salt substitute. The trial switched regular salt (sodium chloride) f...
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks
public-key private-key
2017/10/10
We put forward the notion of self-guarding cryptographic protocols as a countermeasure to algorithm substitution attacks. Such self-guarding protocols can prevent undesirable leakage by subverted algo...
Substitution of whole grains for refined grains: a means to avoid excess B-vitamin intake
refined grains excess B-vitamin hole grains
2018/11/19
We read with interest the article by Karl et al. (1) in a recent issue of the Journal. The authors studied the effects of the substitution of whole grains for refined grains on energy-balance metrics ...
Dietary fatty acid intake after myocardial infarction: a theoretical substitution analysis of the Alpha Omega Cohort
dietary fatty acids cardiac patients cardiovascular disease
2018/11/19
Background: Replacement of saturated fatty acids (SFAs) with unsaturated fatty acids (UFAs), especially polyunsaturated fatty acids (PUFAs), has been associated with a lower risk of ischemic heart dis...
Dietary fatty acid intake after myocardial infarction: a theoretical substitution analysis of the Alpha Omega Cohort
dietary fatty acids cardiac patients cardiovascular disease coronary heart disease substitution analysis prospective cohort study
2018/11/16
Background: Replacement of saturated fatty acids (SFAs) with unsaturated fatty acids (UFAs), especially polyunsaturated fatty acids (PUFAs), has been associated with a lower risk of ischemic heart dis...
Chronic fructose substitution for glucose or sucrose in food or beverages has little effect on fasting blood glucose, insulin, or triglycerides: a systematic review and meta-analysis
sugar replacement fructose glucose sucrose insulin triglycerides diabetes body weight
2018/11/15
Background: Conflicting evidence exists on the role of long-term fructose consumption on health. No systematic review has addressed the effect of isoenergetic fructose replacement of other sugars and ...
Many modern block ciphers are constructed based on the paradigm of substitution-permutation networks (SPNs). But, somewhat surprisingly---especially in comparison with Feistel networks, which have bee...
Bisphenol S instead of bisphenol A:a story of reproductive disruption by regretable substitution–a review
human health environment endocrine disruptor reproduction oocyte sperm
2016/11/11
A range of substances that are released into the environment, foodstuffs and drinking water as a result of human activity were originally considered relatively harmless, and it was only later that the...
Automatic Search for a Maximum Probability Differential Characteristic in a Substitution-Permutation Network
Block ciphers Cryptanalysis
2016/6/27
The algorithm presented in this paper computes a maximum probability differential characteristic in a Substitution-Permutation Network (or SPN). Such characteristics can be used to prove that a cipher...
Functional Cavities in Proteins:A General Method for Proximal Ligand Substitution in Myoglobin
Functional Cavities Proteins Proximal Ligand Substitution Myoglobin
2016/5/23
Functional Cavities in Proteins:A General Method for Proximal Ligand Substitution in Myoglobin.