Ara
Toplam kayıt 4, listelenen: 1-4
On the mixcolumns linear transformation used in AES cipher
(2010)
AES block cipher includes a linear transformation called MixColumns which transforms 32-bit input to 32-bit output. This transformation has the property that makes linear and differential attacks harder. In this study, we ...
Computer-based data analysis techniques: The potential application to crime investigation in cyber space
(Nova Science Publishers, Inc., 2017)
Collecting the most versatile information about individuals and their storing in different databases represent the reality of the contemporary society. The growth in the quantity of information has exceeded man’s power to ...
A Comparative Study of Amino Acid Encoding Methods for Predicting Drug-Target Interactions in COVID-19 Disease
(Springer Science and Business Media Deutschland GmbH, 2022)
Identifying drug-target interactions plays an important role in discovering drugs. Identifying, finding, and preparing drug molecule targets is the key for modern drug discovery. However, potential drug-target interactions ...
Classifying 8-bit to 8-bit S-boxes based on power mappings from the point of DDT and LAT distributions
(Springer-Verlag Berlin, 2008)
S-boxes are vital elements in the design of symmetric ciphers. To date, the techniques for the construction of S-boxes have included pseudo-random generation, finite field inversion, power mappings and heuristic techniques. ...