Showing 2,001 - 2,020 results of 2,263 for search '"cipher"', query time: 0.13s Refine Results
  1. 2001
  2. 2002

    Bayesian networks handbook / by Benson, Mick

    Published 2015
    “…A Bayesian network is a graphical model that ciphers probabilistic relationships among variables of interest. …”
  3. 2003

    Ransomware detection based on machine learning models and Event Tracing for Windows by Artem O. Kalinkin, Svetlana A. Golub, Igor Y. Korkin, Danil N. Pyatovskiy

    Published 2022-09-01
    “…Ransomware are using different types of cryptography, from modern symmetric ciphers to asymmetric ciphers that require the both public key and a private key. …”
    Get full text
    Article
  4. 2004

    Optimizing Hill Climbing Algorithm for S-Boxes Generation by Alexandr Kuznetsov, Emanuele Frontoni, Luca Romeo, Nikolay Poluyanenko, Sergey Kandiy, Kateryna Kuznetsova, Eleonóra Beňová

    Published 2023-05-01
    “…Nonlinear substitutions or S-boxes are important cryptographic primitives of modern symmetric ciphers. They are designed to complicate the plaintext-ciphertext dependency. …”
    Get full text
    Article
  5. 2005

    Solving Degree Bounds for Iterated Polynomial Systems by Matthias Johann Steiner

    Published 2024-03-01
    “… For Arithmetization-Oriented ciphers and hash functions Gröbner basis attacks are generally considered as the most competitive attack vector. …”
    Get full text
    Article
  6. 2006

    Noise-based Stego-ECC by Rahardjo Budi, Muchtadi-Alamsyah Intan, Paryasto Marisa

    Published 2014-03-01
    “…A novel method of inserting noise into stream of ciphered text is proposed. The goal of inserting noise is to increase the level of uncertainty, thus making it harder for an attacker to detect data and noise. …”
    Get full text
    Article
  7. 2007

    Semiotics of “San Fermin” by E V Smirnova

    Published 2014-12-01
    “…The article proposes a kind of semiotic analysis describing tradition to celebrate Spanish national holyday of “San Fermin” and treats the cultural code of the holiday ciphered in its symbols and specifics of cultural and civilization system: holyday is understood as lifting taboos, or as a rest and relaxation, or as a sacred event. …”
    Get full text
    Article
  8. 2008

    Protection of Documents, Cryptography and Secret Communications in Byzantium (the 4th—15th centuries) by S. V. Zapechnikov

    Published 2012-06-01
    “…We discuss here how the written texts were ciphered, how the integrity and authenticity of documents were ensured in Byzantium in the 4th—15th centuries A.D. …”
    Get full text
    Article
  9. 2009
  10. 2010

    On the Relationships between Different Methods for Degree Evaluation by Siwei Chen, Zejun Xiang, Xiangyong Zeng, Shasha Zhang

    Published 2021-03-01
    “…Specifically, for the substitution-permutation-network (SPN) ciphers, we first deeply explore the relationships between division property of an Sbox and its algebraic properties (e.g., the algebraic degree of its inverse). …”
    Get full text
    Article
  11. 2011

    Multivariate Profiling of Hulls for Linear Cryptanalysis by Andrey Bogdanov, Elmar Tischhauser, Philip S. Vejre

    Published 2018-03-01
    “…Extensions of linear cryptanalysis making use of multiple approximations, such as multiple and multidimensional linear cryptanalysis, are an important tool in symmetric-key cryptanalysis, among others being responsible for the best known attacks on ciphers such as Serpent and present. At CRYPTO 2015, Huang et al. provided a refined analysis of the key-dependent capacity leading to a refined key equivalence hypothesis, however at the cost of additional assumptions. …”
    Get full text
    Article
  12. 2012

    A Colour Image Encryption Scheme Using Permutation-Substitution Based on Chaos by Xing-Yuan Wang, Ying-Qian Zhang, Xue-Mei Bao

    Published 2015-06-01
    “…The resultant matrix is then passed through a substitution process. Finally, the ciphered colour image is obtained from the confused matrix. …”
    Get full text
    Article
  13. 2013

    Enhancement of System Security by Using LSB and RSA Algorithms by Muna M. Hummady, Ameer Hussein Morad

    Published 2022-03-01
    “…In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography. …”
    Get full text
    Article
  14. 2014

    Missing Links: The Enduring Web by Marieke Guy, Alexander Ball, Michael Day

    Published 2009-10-01
    “…Early Web pages have an historical importance comparable with prehistoric cave paintings or proto-historic pressed clay ciphers. They are just as fragile. The ease of creation, editing and revising gives content a flexible immediacy: ensuring that sources are up to date and, with appropriate concern for interoperability, content can be folded seamlessly into any number of presentation layers. …”
    Get full text
    Article
  15. 2015

    THE RULE OF FOUR / by Caldwell, Ian, 1976-, author 255651, Thomason, Dustin, author 255668

    Published 2004
    “…What Tom and Paul discover inside shocks even them: proof that the location of a hidden crypt has been ciphered within the pages of the obscure Renaissance text. …”
  16. 2016

    Differentially 4-Uniform Permutations with the Best Known Nonlinearity from Butterflies by Shihui Fu, Xiutao Feng, Baofeng Wu

    Published 2017-06-01
    “…Many block ciphers use permutations defined over the finite field F22k with low differential uniformity, high nonlinearity, and high algebraic degree to provide confusion. …”
    Get full text
    Article
  17. 2017

    New S-box calculation approach for Rijndael-AES based on an artificial neural network by Jaime David Rios Arrañaga, Janneth Alejandra Salamanca Chavarin, Juan José Raygoza Panduro, Edwin Christian Becerra Alvarez

    Published 2017-11-01
    “…The S-box is a basic important component in symmetric key encryption, used in block ciphers to confuse or hide the relationship between the plaintext and the ciphertext. …”
    Get full text
    Article
  18. 2018

    Missing Links: The Enduring Web by Marieke Guy, Alexander Ball, Michael Day

    Published 2009-10-01
    “…Early Web pages have an historical importance comparable with prehistoric cave paintings or proto-historic pressed clay ciphers. They are just as fragile. The ease of creation, editing and revising gives content a flexible immediacy: ensuring that sources are up to date and, with appropriate concern for interoperability, content can be folded seamlessly into any number of presentation layers. …”
    Get full text
    Article
  19. 2019

    Missing Links: The Enduring Web by Marieke Guy, Alexander Ball, Michael Day

    Published 2009-10-01
    “…Early Web pages have an historical importance comparable with prehistoric cave paintings or proto-historic pressed clay ciphers. They are just as fragile. The ease of creation, editing and revising gives content a flexible immediacy: ensuring that sources are up to date and, with appropriate concern for interoperability, content can be folded seamlessly into any number of presentation layers. …”
    Get full text
    Article
  20. 2020

    Missing Links: The Enduring Web by Marieke Guy, Alexander Ball, Michael Day

    Published 2009-10-01
    “…Early Web pages have an historical importance comparable with prehistoric cave paintings or proto-historic pressed clay ciphers. They are just as fragile. The ease of creation, editing and revising gives content a flexible immediacy: ensuring that sources are up to date and, with appropriate concern for interoperability, content can be folded seamlessly into any number of presentation layers. …”
    Get full text
    Article