-
2001
-
2002
Bayesian networks handbook /
Published 2015“…A Bayesian network is a graphical model that ciphers probabilistic relationships among variables of interest. …”
-
2003
Ransomware detection based on machine learning models and Event Tracing for Windows
Published 2022-09-01“…Ransomware are using different types of cryptography, from modern symmetric ciphers to asymmetric ciphers that require the both public key and a private key. …”
Get full text
Article -
2004
Optimizing Hill Climbing Algorithm for S-Boxes Generation
Published 2023-05-01“…Nonlinear substitutions or S-boxes are important cryptographic primitives of modern symmetric ciphers. They are designed to complicate the plaintext-ciphertext dependency. …”
Get full text
Article -
2005
Solving Degree Bounds for Iterated Polynomial Systems
Published 2024-03-01“… For Arithmetization-Oriented ciphers and hash functions Gröbner basis attacks are generally considered as the most competitive attack vector. …”
Get full text
Article -
2006
Noise-based Stego-ECC
Published 2014-03-01“…A novel method of inserting noise into stream of ciphered text is proposed. The goal of inserting noise is to increase the level of uncertainty, thus making it harder for an attacker to detect data and noise. …”
Get full text
Article -
2007
Semiotics of “San Fermin”
Published 2014-12-01“…The article proposes a kind of semiotic analysis describing tradition to celebrate Spanish national holyday of “San Fermin” and treats the cultural code of the holiday ciphered in its symbols and specifics of cultural and civilization system: holyday is understood as lifting taboos, or as a rest and relaxation, or as a sacred event. …”
Get full text
Article -
2008
Protection of Documents, Cryptography and Secret Communications in Byzantium (the 4th—15th centuries)
Published 2012-06-01“…We discuss here how the written texts were ciphered, how the integrity and authenticity of documents were ensured in Byzantium in the 4th—15th centuries A.D. …”
Get full text
Article -
2009
-
2010
On the Relationships between Different Methods for Degree Evaluation
Published 2021-03-01“…Specifically, for the substitution-permutation-network (SPN) ciphers, we first deeply explore the relationships between division property of an Sbox and its algebraic properties (e.g., the algebraic degree of its inverse). …”
Get full text
Article -
2011
Multivariate Profiling of Hulls for Linear Cryptanalysis
Published 2018-03-01“…Extensions of linear cryptanalysis making use of multiple approximations, such as multiple and multidimensional linear cryptanalysis, are an important tool in symmetric-key cryptanalysis, among others being responsible for the best known attacks on ciphers such as Serpent and present. At CRYPTO 2015, Huang et al. provided a refined analysis of the key-dependent capacity leading to a refined key equivalence hypothesis, however at the cost of additional assumptions. …”
Get full text
Article -
2012
A Colour Image Encryption Scheme Using Permutation-Substitution Based on Chaos
Published 2015-06-01“…The resultant matrix is then passed through a substitution process. Finally, the ciphered colour image is obtained from the confused matrix. …”
Get full text
Article -
2013
Enhancement of System Security by Using LSB and RSA Algorithms
Published 2022-03-01“…In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography. …”
Get full text
Article -
2014
Missing Links: The Enduring Web
Published 2009-10-01“…Early Web pages have an historical importance comparable with prehistoric cave paintings or proto-historic pressed clay ciphers. They are just as fragile. The ease of creation, editing and revising gives content a flexible immediacy: ensuring that sources are up to date and, with appropriate concern for interoperability, content can be folded seamlessly into any number of presentation layers. …”
Get full text
Article -
2015
THE RULE OF FOUR /
Published 2004“…What Tom and Paul discover inside shocks even them: proof that the location of a hidden crypt has been ciphered within the pages of the obscure Renaissance text. …”
-
2016
Differentially 4-Uniform Permutations with the Best Known Nonlinearity from Butterflies
Published 2017-06-01“…Many block ciphers use permutations defined over the finite field F22k with low differential uniformity, high nonlinearity, and high algebraic degree to provide confusion. …”
Get full text
Article -
2017
New S-box calculation approach for Rijndael-AES based on an artificial neural network
Published 2017-11-01“…The S-box is a basic important component in symmetric key encryption, used in block ciphers to confuse or hide the relationship between the plaintext and the ciphertext. …”
Get full text
Article -
2018
Missing Links: The Enduring Web
Published 2009-10-01“…Early Web pages have an historical importance comparable with prehistoric cave paintings or proto-historic pressed clay ciphers. They are just as fragile. The ease of creation, editing and revising gives content a flexible immediacy: ensuring that sources are up to date and, with appropriate concern for interoperability, content can be folded seamlessly into any number of presentation layers. …”
Get full text
Article -
2019
Missing Links: The Enduring Web
Published 2009-10-01“…Early Web pages have an historical importance comparable with prehistoric cave paintings or proto-historic pressed clay ciphers. They are just as fragile. The ease of creation, editing and revising gives content a flexible immediacy: ensuring that sources are up to date and, with appropriate concern for interoperability, content can be folded seamlessly into any number of presentation layers. …”
Get full text
Article -
2020
Missing Links: The Enduring Web
Published 2009-10-01“…Early Web pages have an historical importance comparable with prehistoric cave paintings or proto-historic pressed clay ciphers. They are just as fragile. The ease of creation, editing and revising gives content a flexible immediacy: ensuring that sources are up to date and, with appropriate concern for interoperability, content can be folded seamlessly into any number of presentation layers. …”
Get full text
Article