-
1981
Watermark blending technique for securing user authentication data in mobile application systems
Published 2019“…The added factors are mobile IMEI number, mobile SIM card number, random number and time. In ciphering technique, the user authentication factors are not only encrypted but also hashed to ensure the encrypted data cannot be easily decrypted. …”
Get full text
Conference or Workshop Item -
1982
An Intra-Slice Security Solution for Emerging 5G Networks Based on Pseudo-Random Number Generators
Published 2018-01-01“…Traditionally, some solutions (such as stream ciphers) were not considered in mobile networks. However, 5G systems will be extensively employed in other new and very distinct scenarios, where requirements are different. …”
Get full text
Article -
1983
Secure document management model based on distributed data transmission with authentication
Published 2015-12-01“…The research result is a secure document management model based on the dual-link MV2 cryptoalgorithm, and AES and RC4 underlying ciphers. The replacement of the basic ciphers is provided, and the need of the additional associated data which must remain open, but be authenticated with the basic encrypted information is considered. …”
Get full text
Article -
1984
New Results on Machine Learning-Based Distinguishers
Published 2023-01-01“…Recently, we have seen its usage in the realm of differential distinguishers for symmetric key ciphers. It has been shown that ML-based differential distinguishers can be easily extended to break round-reduced versions of ciphers. …”
Get full text
Article -
1985
Efficient hardware accelerator for NORX authenticated encryption
Published 2020“…There is an unceasing demand of high-performance and area-efficient AEAD ciphers due to the emergence of security at the edge of computing fabric, such as, sensors and smartphone devices. …”
Get full text
Conference Paper -
1986
New results on machine learning-based distinguishers
Published 2023“…Recently, we have seen its usage in the realm of differential distinguishers for symmetric key ciphers. It has been shown that ML-based differential distinguishers can be easily extended to break round-reduced versions of ciphers. …”
Get full text
Journal Article -
1987
Performance Comparison between RSA and El-Gamal Algorithms for Speech Data Encryption and Decryption
Published 2023-03-01“…Additionally, the outcomes indicate that the RSA speech cryptosystem outperforms its counterpart the El-Gamal speech cryptosystem in most of ciphering/deciphering speech performance metrics. …”
Get full text
Article -
1988
Frimureriets medier: Om 1700-talsfrimureriets mediering av hemligheter i tal, handskrift och tryck
Published 2017-12-01“…In order to distribute – but also in a sense create – secrets, the masons made use of several techniques such as vows of silence, locked archives, ciphers and hieroglyphs which were used either to enclose information (at the level of the medium) or encode it (at the level of meaning). …”
Get full text
Article -
1989
More Accurate Differential Properties of LED64 and Midori64
Published 2018-09-01“…In this paper, we focus on two lightweight block ciphers – LED64 and Midori64 and show the more accurate estimation of differential probability considering the key schedule. …”
Get full text
Article -
1990
Accelerating the Search of Differential and Linear Characteristics with the SAT Method
Published 2021-03-01“…The new idea is applied to search for optimal differential and linear characteristics for multiple ciphers. For PRESENT, GIFT-64, RECTANGLE, LBlock, TWINE, and some versions in SIMON and SPECK families of block ciphers, we obtain the complete bounds (full rounds) on the number of active S-boxes, the differential probability, as well as the linear bias. …”
Get full text
Article -
1991
Design and evaluation of a virtual private network architecture for collaborating specialist users
Published 2016“…For the purpose of evaluation, round trip time (RTT) is measured and reported as the performance metric based on the different encryption ciphers and digest ciphers as the network metrics.…”
Get full text
Article -
1992
A Novel Hybrid Cryptosystem for Secure Streaming of High Efficiency H.265 Compressed Videos in IoT Multimedia Applications
Published 2020-01-01“…Then, the DNA encoding sequences are established on the primary encrypted frames resulted from the previous chaotic ciphering process. After that, a modified Mandelbrot set-based conditional shift process is presented to effectively introduce confusion features on the Y, U, and V channels of the resulted ciphered frames. …”
Get full text
Article -
1993
More accurate differential properties of LED64 and Midori64
Published 2019“…In this paper, we focus on two lightweight block ciphers – LED64 and Midori64 and show the more accurate estimation of differential probability considering the key schedule. …”
Get full text
Get full text
Journal Article -
1994
Identity of Shakespeare
Published 2012-12-01“…As you probably know, codes and ciphers are highly suspect in the Shakespeare Authorship debate-even by some (if not most) of those who acknowledge themselves as "Oxfordians." …”
Get full text
Article -
1995
Snake Eyes. A Natural History of Picturing, Perception, and the Serpents That Lurk Within
Published 2022-01-01“…Meanwhile, research suggests that serpentine shapes are present as ciphers within our visual circuitry before we ever even see them. …”
Get full text
Article -
1996
El divorcio en España tras 22 años de su legalización
Published 2003-01-01“…As civil status is not included in present Population Census and Lists, it is not possible to compare it with later years ciphers; therefore, space distribution of divorces by provinces is represented according to statistics from the INE.…”
Get full text
Article -
1997
The Influence of Quran o Sunnah on Iqbal’s thought: A critical review
Published 2022-06-01“…The intellectual and technical aspects of Iqbal's poetry may be ciphered better through the Qur'an.…”
Get full text
Article -
1998
SoK: Modeling for Large S-boxes Oriented to Differential Probabilities and Linear Correlations
Published 2023-03-01“…Typically, the designers of novel ciphers also give preliminary analytical findings for analysing the differential and linear properties using automatic techniques. …”
Get full text
Article -
1999
Gene Therapy Leaves a Vicious Cycle
Published 2019-04-01“…The human genetic code encrypted in thousands of genes holds the secret for synthesis of proteins that drive all biological processes necessary for normal life and death. Though the genetic ciphering remains unchanged through generations, some genes get disrupted, deleted and or mutated, manifesting diseases, and or disorders. …”
Get full text
Article -
2000
Provably throttling SQLI using an enciphering query and secure matching
Published 2022-12-01“…The login process compares the ciphered username from the database and user entry to authenticate the user. …”
Get full text
Article