Showing 1,981 - 2,000 results of 2,263 for search '"cipher"', query time: 0.15s Refine Results
  1. 1981

    Watermark blending technique for securing user authentication data in mobile application systems by Mohamed, Kartini, Sidi, Fatimah, A. Jabar, Marzanah, Ishak, Iskandar

    Published 2019
    “…The added factors are mobile IMEI number, mobile SIM card number, random number and time. In ciphering technique, the user authentication factors are not only encrypted but also hashed to ensure the encrypted data cannot be easily decrypted. …”
    Get full text
    Conference or Workshop Item
  2. 1982

    An Intra-Slice Security Solution for Emerging 5G Networks Based on Pseudo-Random Number Generators by Borja Bordel, Amalia Beatriz Orue, Ramon Alcarria, Diego Sanchez-De-Rivera

    Published 2018-01-01
    “…Traditionally, some solutions (such as stream ciphers) were not considered in mobile networks. However, 5G systems will be extensively employed in other new and very distinct scenarios, where requirements are different. …”
    Get full text
    Article
  3. 1983

    Secure document management model based on distributed data transmission with authentication by Vladimir M. Deundyak, Svetlana B. Popova

    Published 2015-12-01
    “…The research result is a secure document management model based on the dual-link MV2 cryptoalgorithm, and AES and RC4 underlying ciphers. The replacement of the basic ciphers is provided, and the need of the additional associated data which must remain open, but be authenticated with the basic encrypted information is considered. …”
    Get full text
    Article
  4. 1984

    New Results on Machine Learning-Based Distinguishers by Anubhab Baksi, Jakub Breier, Vishnu Asutosh Dasu, Xiaolu Hou, Hyunji Kim, Hwajeong Seo

    Published 2023-01-01
    “…Recently, we have seen its usage in the realm of differential distinguishers for symmetric key ciphers. It has been shown that ML-based differential distinguishers can be easily extended to break round-reduced versions of ciphers. …”
    Get full text
    Article
  5. 1985

    Efficient hardware accelerator for NORX authenticated encryption by Kumar, Sachin, Haj-Yahya, Jawad, Chattopadhyay, Anupam

    Published 2020
    “…There is an unceasing demand of high-performance and area-efficient AEAD ciphers due to the emergence of security at the edge of computing fabric, such as, sensors and smartphone devices. …”
    Get full text
    Conference Paper
  6. 1986

    New results on machine learning-based distinguishers by Baksi, Anubhab, Breier, Jakub, Dasu, Vishnu Asutosh, Hou, Xiaolu, Kim, Hyunji, Seo, Hwajeong

    Published 2023
    “…Recently, we have seen its usage in the realm of differential distinguishers for symmetric key ciphers. It has been shown that ML-based differential distinguishers can be easily extended to break round-reduced versions of ciphers. …”
    Get full text
    Journal Article
  7. 1987

    Performance Comparison between RSA and El-Gamal Algorithms for Speech Data Encryption and Decryption by Sura F. Yousif

    Published 2023-03-01
    “…Additionally, the outcomes indicate that the RSA speech cryptosystem outperforms its counterpart the El-Gamal speech cryptosystem in most of ciphering/deciphering speech performance metrics. …”
    Get full text
    Article
  8. 1988

    Frimureriets medier: Om 1700-talsfrimureriets mediering av hemligheter i tal, handskrift och tryck by Tim Berndtsson

    Published 2017-12-01
    “…In order to distribute – but also in a sense create – secrets, the masons made use of several techniques such as vows of silence, locked archives, ciphers and hieroglyphs which were used either to enclose information (at the level of the medium) or encode it (at the level of meaning). …”
    Get full text
    Article
  9. 1989

    More Accurate Differential Properties of LED64 and Midori64 by Ling Sun, Wei Wang, Meiqin Wang

    Published 2018-09-01
    “…In this paper, we focus on two lightweight block ciphers – LED64 and Midori64 and show the more accurate estimation of differential probability considering the key schedule. …”
    Get full text
    Article
  10. 1990

    Accelerating the Search of Differential and Linear Characteristics with the SAT Method by Ling Su, Wei Wang, Meiqin Wang

    Published 2021-03-01
    “…The new idea is applied to search for optimal differential and linear characteristics for multiple ciphers. For PRESENT, GIFT-64, RECTANGLE, LBlock, TWINE, and some versions in SIMON and SPECK families of block ciphers, we obtain the complete bounds (full rounds) on the number of active S-boxes, the differential probability, as well as the linear bias. …”
    Get full text
    Article
  11. 1991

    Design and evaluation of a virtual private network architecture for collaborating specialist users by Sistani, Akram Kargar Raeespour, Patel, Ahmed Moosajee

    Published 2016
    “…For the purpose of evaluation, round trip time (RTT) is measured and reported as the performance metric based on the different encryption ciphers and digest ciphers as the network metrics.…”
    Get full text
    Article
  12. 1992

    A Novel Hybrid Cryptosystem for Secure Streaming of High Efficiency H.265 Compressed Videos in IoT Multimedia Applications by Abdulaziz Alarifi, Syam Sankar, Torki Altameem, K. C. Jithin, Mohammed Amoon, Walid El-Shafai

    Published 2020-01-01
    “…Then, the DNA encoding sequences are established on the primary encrypted frames resulted from the previous chaotic ciphering process. After that, a modified Mandelbrot set-based conditional shift process is presented to effectively introduce confusion features on the Y, U, and V channels of the resulted ciphered frames. …”
    Get full text
    Article
  13. 1993

    More accurate differential properties of LED64 and Midori64 by Sun, Ling, Wang, Wei, Wang, Meiqin

    Published 2019
    “…In this paper, we focus on two lightweight block ciphers – LED64 and Midori64 and show the more accurate estimation of differential probability considering the key schedule. …”
    Get full text
    Get full text
    Journal Article
  14. 1994

    Identity of Shakespeare by James S. Ferris

    Published 2012-12-01
    “…As you probably know, codes and ciphers are highly suspect in the Shakespeare Authorship debate-even by some (if not most) of those who acknowledge themselves as "Oxfordians." …”
    Get full text
    Article
  15. 1995

    Snake Eyes. A Natural History of Picturing, Perception, and the Serpents That Lurk Within by Andrew S. Yang

    Published 2022-01-01
    “…Meanwhile, research suggests that serpentine shapes are present as ciphers within our visual circuitry before we ever even see them. …”
    Get full text
    Article
  16. 1996

    El divorcio en España tras 22 años de su legalización by Mª José Aguilera Arilla, Mª Pilar González Yanci

    Published 2003-01-01
    “…As civil status is not included in present Population Census and Lists, it is not possible to compare it with later years ciphers; therefore, space distribution of divorces by provinces is represented according to statistics from the INE.…”
    Get full text
    Article
  17. 1997

    The Influence of Quran o Sunnah on Iqbal’s thought: A critical review by Muhammad Amir Iqbal

    Published 2022-06-01
    “…The intellectual and technical aspects of Iqbal's poetry may be ciphered better through the Qur'an.…”
    Get full text
    Article
  18. 1998

    SoK: Modeling for Large S-boxes Oriented to Differential Probabilities and Linear Correlations by Ling Sun, Meiqin Wang

    Published 2023-03-01
    “…Typically, the designers of novel ciphers also give preliminary analytical findings for analysing the differential and linear properties using automatic techniques. …”
    Get full text
    Article
  19. 1999

    Gene Therapy Leaves a Vicious Cycle by Reena Goswami, Gayatri Subramanian, Liliya Silayeva, Isabelle Newkirk, Deborah Doctor, Karan Chawla, Saurabh Chattopadhyay, Dhyan Chandra, Nageswararao Chilukuri, Venkaiah Betapudi, Venkaiah Betapudi

    Published 2019-04-01
    “…The human genetic code encrypted in thousands of genes holds the secret for synthesis of proteins that drive all biological processes necessary for normal life and death. Though the genetic ciphering remains unchanged through generations, some genes get disrupted, deleted and or mutated, manifesting diseases, and or disorders. …”
    Get full text
    Article
  20. 2000

    Provably throttling SQLI using an enciphering query and secure matching by Mohammed Abdulridha Hussain, Zaid Alaa Hussien, Zaid Ameen Abduljabbar, Junchao Ma, Mustafa A. Al Sibahee, Sarah Abdulridha Hussain, Vincent Omollo Nyangaresi, Xianlong Jiao

    Published 2022-12-01
    “…The login process compares the ciphered username from the database and user entry to authenticate the user. …”
    Get full text
    Article