Showing 2,021 - 2,040 results of 2,263 for search '"cipher"', query time: 0.20s Refine Results
  1. 2021

    Calculation of Forecast - Tool of the Decision and the Example of a Shipping Entity DANUBTRANS Galati S.C. by Mihaela-Cristina ONICA

    Published 2011-11-01
    “…Thus, the budget is a forecast of ciphered resource damage and liability insurance for business objectives cost-effectively.…”
    Get full text
    Article
  2. 2022

    Missing Links: The Enduring Web by Marieke Guy, Alexander Ball, Michael Day

    Published 2009-10-01
    “…Early Web pages have an historical importance comparable with prehistoric cave paintings or proto-historic pressed clay ciphers. They are just as fragile. The ease of creation, editing and revising gives content a flexible immediacy: ensuring that sources are up to date and, with appropriate concern for interoperability, content can be folded seamlessly into any number of presentation layers. …”
    Get full text
    Article
  3. 2023

    Missing Links: The Enduring Web by Marieke Guy, Alexander Ball, Michael Day

    Published 2009-10-01
    “…Early Web pages have an historical importance comparable with prehistoric cave paintings or proto-historic pressed clay ciphers. They are just as fragile. The ease of creation, editing and revising gives content a flexible immediacy: ensuring that sources are up to date and, with appropriate concern for interoperability, content can be folded seamlessly into any number of presentation layers. …”
    Get full text
    Article
  4. 2024

    Katrina + 5: An X-Code Exhibition by Dorothy Moye

    Published 2010-08-01
    “…Visually striking and emotionally compelling, the X-code speaks through its sheer numbers, its rhythmic repetition across the curving network of city streets, its narrative traces of ciphered messages, and its graphic directness.…”
    Get full text
    Article
  5. 2025

    Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing by Yuseop Lee, Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong

    Published 2014-01-01
    “…PRINTcipher-48/96 are 48/96-bit block ciphers proposed in CHES 2010 which support the 80/160-bit secret keys, respectively. …”
    Get full text
    Article
  6. 2026

    A New Method for Generating High Non-linearity S-Boxes by P. Tesar

    Published 2010-04-01
    “…Substitution boxes are important parts in many block and stream ciphers. The emergence of a range of crypto-attacks has led to the development of criteria for repelling such attacks. …”
    Get full text
    Article
  7. 2027

    Advanced encryption standard algorithm versus extreme learning machine based weight: a comparative study by Abdulzahra, Hayfaa Atee, Ahmad, Robiah, Mohd. Noor, Norliza, Abidulkarim, Kadhim Ilijan

    Published 2017
    “…Advanced Encryption Standard (AES) is beingwidely used ciphering/deciphering system has emerged asa standard benchmark. …”
    Article
  8. 2028

    Revisiting the Extension of Matsui’s Algorithm 1 to Linear Hulls: Application to TinyJAMBU by Muzhou Li, Nicky Mouha, Ling Sun, Meiqin Wang

    Published 2022-06-01
    “…Algorithm 2 requires partial encryptions or decryptions to obtain these state bits after guessing extra key bits. For ciphers where only part of the state can be obtained, like some stream ciphers and authenticated encryption schemes, Algorithm 2 will not work efficiently since it is hard to implement partial encryptions or decryptions. …”
    Get full text
    Article
  9. 2029

    Quantum Identity-Based Encryption from the Learning with Errors Problem by Wenhua Gao, Li Yang, Daode Zhang, Xia Liu

    Published 2022-02-01
    “…To prevent eavesdropping and tampering, network security protocols take advantage of asymmetric ciphers to establish session-specific shared keys with which further communication is encrypted using symmetric ciphers. …”
    Get full text
    Article
  10. 2030

    Novel Image Encryption Using a Pseudoset Generated by Chaotic Permutation Multicircular Shrinking With a Gradual Deletion of the Input Set by Kalamullah Ramli, Yohan Suryanto, Magfirawaty, Nur Hayati

    Published 2020-01-01
    “…Based on histogram and entropy analyses, the proposed scheme is also robust to statistical analysis. Moreover, the ciphered image has a very high degree of randomness according to the National Institute of Standards and Technology (NIST) randomness test results. …”
    Get full text
    Article
  11. 2031

    Radix-2<sup>2</sup> Algorithm for the Odd New Mersenne Number Transform (ONMNT) by Yousuf Al-Aali, Mounir T. Hamood, Said Boussakta

    Published 2023-10-01
    “…The proposed method should pave the way for efficient and flexible implementation of ONMNT and IONMNT in applications such as lightweight ciphers and signal processing. The algorithm has been implemented in C and is validated with an example.…”
    Get full text
    Article
  12. 2032

    An improved user authentication model for mobile application systems by Mohamed, Kartini

    Published 2017
    “…The user authentication is made strong using three different techniques namely multifactoring, ciphering, and watermarking techniques. It is considered acceptable by mobile users based on the results obtained from statistical analysis carried out in this study. …”
    Get full text
    Thesis
  13. 2033

    Novel Models of Image Permutation and Diffusion Based on Perturbed Digital Chaos by Thang Manh Hoang, Safwan El Assad

    Published 2020-05-01
    “…Amounts of perturbation are initially the coordinate of pixels in the permutation, the value of ciphered word in the diffusion, and then a value extracted from state variables in every iteration. …”
    Get full text
    Article
  14. 2034

    A novel JPEG steganography method based on modulus function with histogram analysis by V. Banoci, G. Bugar, D. Levicky, Z. Klenovicova

    Published 2012-06-01
    “…After-embedding histogram of proposed Modulo Histogram Fitting (MHF) method is analyzed to secure steganography system against steganalysis attacks. In addition, AES ciphering was implemented to increase security and improve histogram after-embedding characteristics of proposed steganography system as experimental results show.…”
    Get full text
    Article
  15. 2035

    A Novel Plaintext-Related Color Image Encryption Scheme Based on Cellular Neural Network and Chen’s Chaotic System by Renxiu Zhang, Longfei Yu, Donghua Jiang, Wei Ding, Jian Song, Kuncheng He, Qun Ding

    Published 2021-02-01
    “…To address the problem that traditional stream ciphers are not sensitive to changes in the plaintext, a novel plaintext-related color image encryption scheme is proposed in this paper, which combines the 6-dimensional cellular neural network (CNN) and Chen’s chaotic system. …”
    Get full text
    Article
  16. 2036

    Dasta – Alternative Linear Layer for Rasta by Phil Hebborn, Gregor Leander

    Published 2020-09-01
    “…Rasta is an approach for a family of stream ciphers with an exceptional low AND depth, which equals the number of ANDs per encrypted bit. …”
    Get full text
    Article
  17. 2037

    About permutations on the sets of tuples from elements of the finite field by V.S. Kugurakov, A.F. Gainutdinova, V.T. Dubrovin

    Published 2019-06-01
    “…The obtained results can be used to construct S-boxes and P-boxes in block ciphers and to calculate automorphism groups of error-correcting codes.…”
    Get full text
    Article
  18. 2038

    Multiple Data Type Encryption using Genetic Neural Network by Raid R. Al-Nima, Ali N. Hamed, Ridwaan Y. Srdeeq

    Published 2010-06-01
    “…The aim of this research is to build a ciphering system by using genetic neural network technique to protect data against unauthorized access to the data being transferred. …”
    Get full text
    Article
  19. 2039

    Improved Meet-in-the-Middle cryptanalysis of KTANTAN (poster) by Wei, Lei, Rechberger, Christian, Guo, Jian, Wu, Hongjun, Wang, Huaxiong, Ling, San

    Published 2012
    “…This paper presents ongoing work towards extensions of meet-in-the-middle (MITM) attacks on block ciphers. Exploring developments in MITM attacks in hash analysis such as: (i) the splice-and-cut technique; (ii) the indirect-partial-matching technique. …”
    Get full text
    Get full text
    Conference Paper
  20. 2040

    Increase throughput of CCM security mode using MKP by Ahmad Zulkarnain, Zuriati

    Published 2014
    “…The CCM security operation mode adopts CTR, and CBC-MAC schemes to implement message ciphering and authentication respectively. There are two limitations of CCM including the secret key which should refresh for each 264 blocks in CTR mode and the authentication operation of CBC-MAC works in sequential fashion on multi-processor system. …”
    Article