-
2021
Calculation of Forecast - Tool of the Decision and the Example of a Shipping Entity DANUBTRANS Galati S.C.
Published 2011-11-01“…Thus, the budget is a forecast of ciphered resource damage and liability insurance for business objectives cost-effectively.…”
Get full text
Article -
2022
Missing Links: The Enduring Web
Published 2009-10-01“…Early Web pages have an historical importance comparable with prehistoric cave paintings or proto-historic pressed clay ciphers. They are just as fragile. The ease of creation, editing and revising gives content a flexible immediacy: ensuring that sources are up to date and, with appropriate concern for interoperability, content can be folded seamlessly into any number of presentation layers. …”
Get full text
Article -
2023
Missing Links: The Enduring Web
Published 2009-10-01“…Early Web pages have an historical importance comparable with prehistoric cave paintings or proto-historic pressed clay ciphers. They are just as fragile. The ease of creation, editing and revising gives content a flexible immediacy: ensuring that sources are up to date and, with appropriate concern for interoperability, content can be folded seamlessly into any number of presentation layers. …”
Get full text
Article -
2024
Katrina + 5: An X-Code Exhibition
Published 2010-08-01“…Visually striking and emotionally compelling, the X-code speaks through its sheer numbers, its rhythmic repetition across the curving network of city streets, its narrative traces of ciphered messages, and its graphic directness.…”
Get full text
Article -
2025
Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing
Published 2014-01-01“…PRINTcipher-48/96 are 48/96-bit block ciphers proposed in CHES 2010 which support the 80/160-bit secret keys, respectively. …”
Get full text
Article -
2026
A New Method for Generating High Non-linearity S-Boxes
Published 2010-04-01“…Substitution boxes are important parts in many block and stream ciphers. The emergence of a range of crypto-attacks has led to the development of criteria for repelling such attacks. …”
Get full text
Article -
2027
Advanced encryption standard algorithm versus extreme learning machine based weight: a comparative study
Published 2017“…Advanced Encryption Standard (AES) is beingwidely used ciphering/deciphering system has emerged asa standard benchmark. …”
Article -
2028
Revisiting the Extension of Matsui’s Algorithm 1 to Linear Hulls: Application to TinyJAMBU
Published 2022-06-01“…Algorithm 2 requires partial encryptions or decryptions to obtain these state bits after guessing extra key bits. For ciphers where only part of the state can be obtained, like some stream ciphers and authenticated encryption schemes, Algorithm 2 will not work efficiently since it is hard to implement partial encryptions or decryptions. …”
Get full text
Article -
2029
Quantum Identity-Based Encryption from the Learning with Errors Problem
Published 2022-02-01“…To prevent eavesdropping and tampering, network security protocols take advantage of asymmetric ciphers to establish session-specific shared keys with which further communication is encrypted using symmetric ciphers. …”
Get full text
Article -
2030
Novel Image Encryption Using a Pseudoset Generated by Chaotic Permutation Multicircular Shrinking With a Gradual Deletion of the Input Set
Published 2020-01-01“…Based on histogram and entropy analyses, the proposed scheme is also robust to statistical analysis. Moreover, the ciphered image has a very high degree of randomness according to the National Institute of Standards and Technology (NIST) randomness test results. …”
Get full text
Article -
2031
Radix-2<sup>2</sup> Algorithm for the Odd New Mersenne Number Transform (ONMNT)
Published 2023-10-01“…The proposed method should pave the way for efficient and flexible implementation of ONMNT and IONMNT in applications such as lightweight ciphers and signal processing. The algorithm has been implemented in C and is validated with an example.…”
Get full text
Article -
2032
An improved user authentication model for mobile application systems
Published 2017“…The user authentication is made strong using three different techniques namely multifactoring, ciphering, and watermarking techniques. It is considered acceptable by mobile users based on the results obtained from statistical analysis carried out in this study. …”
Get full text
Thesis -
2033
Novel Models of Image Permutation and Diffusion Based on Perturbed Digital Chaos
Published 2020-05-01“…Amounts of perturbation are initially the coordinate of pixels in the permutation, the value of ciphered word in the diffusion, and then a value extracted from state variables in every iteration. …”
Get full text
Article -
2034
A novel JPEG steganography method based on modulus function with histogram analysis
Published 2012-06-01“…After-embedding histogram of proposed Modulo Histogram Fitting (MHF) method is analyzed to secure steganography system against steganalysis attacks. In addition, AES ciphering was implemented to increase security and improve histogram after-embedding characteristics of proposed steganography system as experimental results show.…”
Get full text
Article -
2035
A Novel Plaintext-Related Color Image Encryption Scheme Based on Cellular Neural Network and Chen’s Chaotic System
Published 2021-02-01“…To address the problem that traditional stream ciphers are not sensitive to changes in the plaintext, a novel plaintext-related color image encryption scheme is proposed in this paper, which combines the 6-dimensional cellular neural network (CNN) and Chen’s chaotic system. …”
Get full text
Article -
2036
Dasta – Alternative Linear Layer for Rasta
Published 2020-09-01“…Rasta is an approach for a family of stream ciphers with an exceptional low AND depth, which equals the number of ANDs per encrypted bit. …”
Get full text
Article -
2037
About permutations on the sets of tuples from elements of the finite field
Published 2019-06-01“…The obtained results can be used to construct S-boxes and P-boxes in block ciphers and to calculate automorphism groups of error-correcting codes.…”
Get full text
Article -
2038
Multiple Data Type Encryption using Genetic Neural Network
Published 2010-06-01“…The aim of this research is to build a ciphering system by using genetic neural network technique to protect data against unauthorized access to the data being transferred. …”
Get full text
Article -
2039
Improved Meet-in-the-Middle cryptanalysis of KTANTAN (poster)
Published 2012“…This paper presents ongoing work towards extensions of meet-in-the-middle (MITM) attacks on block ciphers. Exploring developments in MITM attacks in hash analysis such as: (i) the splice-and-cut technique; (ii) the indirect-partial-matching technique. …”
Get full text
Get full text
Conference Paper -
2040
Increase throughput of CCM security mode using MKP
Published 2014“…The CCM security operation mode adopts CTR, and CBC-MAC schemes to implement message ciphering and authentication respectively. There are two limitations of CCM including the secret key which should refresh for each 264 blocks in CTR mode and the authentication operation of CBC-MAC works in sequential fashion on multi-processor system. …”
Article