-
2061
Enhancing secured data hiding using dynamic digital signature for authentication purpose
Published 2014“…However, two issues that required to be addressed are large size of the ciphered data in digital signature and making it closer to the original file. …”
Article -
2062
Жизнефрения Всеволода Некрасова
Published 2022-06-01“…However, it also considers the more general question of whether it is possible to transpose poetry full of delicate humour, hidden allusions, codes and ciphers into another language in such a way that the reader would not be deprived of the aesthetic impression of the original. …”
Get full text
Article -
2063
An Absolutely Patient Action: The Translator as a Figure of Ethical Communication
Published 2011-12-01“…And the translator’s task is always impossible, insofar as total respect (ciphered as total fidelity) gives way to what is inevitably “lost in translation.” …”
Get full text
Article -
2064
The organization of the statistical account of readers
Published 2019-01-01“…It enabled to count readers in an automated mode, operate statistics, differentiate readers by professional categories, ciphers of a specialty, education, age, gender, etc., which positively affected the formation of a modern method of studying the reader contingent. …”
Get full text
Article -
2065
An Interactive Online Interprofessional Opioid Education Training Using Standardized Patients
Published 2023-08-01Get full text
Article -
2066
Security in robot operating system (ROS) by using Advanced Encryption Standard (AES)
Published 2018“…The study investigates a robot’s performance when ciphering the messages interchanged between ROS nodes under the publish/subscribe paradigm. …”
Get full text
Undergraduates Project Papers -
2067
RSA ENCRYPTION USING VLSI ARCHITECTURE FOR HIGH SPEED APPLICATIONS
Published 2017-12-01“…To overcome such illegal access the security of modern computer systems uses public-ciphers key namely Rivest, Shamir and Adleman (RSA). …”
Get full text
Article -
2068
An Evaluation of Power Consumption Gain and Security of Flexible Green Pool Mining in Public Blockchain Systems
Published 2023-04-01“…The novelty of the proposed architecture lies in the employment of an innovative cryptographic puzzle that is based on stream ciphering. This enables flexibility in setting the difficulty parameter of the protocol, and allows for the separation of the energy and memory resources that are required for the puzzle solving. …”
Get full text
Article -
2069
A Novel Algorithm of Constructing Highly Nonlinear S-p-boxes
Published 2019-01-01“…The role of substitution boxes is very important in block ciphers. Substitution boxes are utilized to create confusion in the cryptosystem. …”
Get full text
Article -
2070
Construction of S-Box Based on Chaotic Map and Algebraic Structures
Published 2019-03-01“…The substitution box (S-box) is the main component of many modern symmetric encryption ciphers that provides confusion between the secret key and ciphertext. …”
Get full text
Article -
2071
Adaptation of a genetic operator and a dynamic S-box for chaotic encryption of medical and color images
Published 2023-03-01“…A passage in hexadecimal notation is carried out on the values of the pixels of the original image, followed by a subdivision of the vector obtained into sub-blocks of size 1×6, for a future submission to two rounds of genetic mutation adapted to ciphers of color images and controlled by chaotic vectors. …”
Get full text
Article -
2072
Hybrid hiding in multimedia files
Published 2012-07-01“…The principle of hybrid information hiding represented by process of information hiding message (multimedia files) embedded inside another message which is depended on hiding a certain media in another media using different domains (special domain, frequency domain) to provide protection and security for transformed data, this paper suggest an algorithm by using two different files first one compressed binary image, the compression method is run-length and hided this file inside the hostage media by use frequency domain which is represented by Discrete cosine transform (DCT), the second is text ciphered by Caesar method which is depended one secret key by using spatial domain. …”
Get full text
Article -
2073
Research Status of Nonlinear Feedback Shift Register Based on Semi-Tensor Product
Published 2022-09-01“…Nonlinear feedback shift registers (NFSRs) are the main components of stream ciphers and convolutional decoders. Recent years have seen an increase in the requirement for information security, which has sparked NFSR research. …”
Get full text
Article -
2074
Lightweight Diffusion Layer: Importance of Toeplitz Matrices
Published 2016-12-01“…MDS matrices are used as building blocks of diffusion layers in block ciphers, and XOR count is a metric that estimates the hardware implementation cost. …”
Get full text
Article -
2075
Provably Secure Encryption Schemes With Zero Setup and Linear Speed by Using Rubik’s Cubes
Published 2020-01-01“…Different from most naive designs of permutation ciphers based on Rubik's cubes, our proposals are probabilistic encryption schemes that combine some of the newest cryptographic primitives with modern coding theory. …”
Get full text
Article -
2076
Brute force searching, the typical set and Guesswork
Published 2014“…It is tempting to use this property in cryptanalysis of computationally secure ciphers by assuming coded words are drawn from a source's typical set and so, for all intents and purposes, uniformly distributed within it. …”
Get full text
Get full text
Get full text
Article -
2077
The Deoxys AEAD family
Published 2022“…Deoxys uses a new family of tweakable block ciphers as internal primitive, Deoxys-TBC, which follows the TWEAKEY framework (Jean, Nikolić, and Peyrin, ASIACRYPT 2014) and relies on the AES round function. …”
Get full text
Journal Article -
2078
Online Detection and Reactive Countermeasure for leakage from BPU using TVLA
Published 2018“…In recent years, performance counters have been used as a side channel source for the branch mispredictions which can be used to attack ciphers with user privileges. In this paper we propose an online leakage detection tool Branch-Monitor for branch misprediction traces which does an online detection of the leakage and raises an alarm if there exists a significant difference in the distribution of branch misses for selected inputs. …”
Get full text
Get full text
Conference Paper -
2079
UN SENATORE AL GRAND TOUR: GIUSEPPE AURELIO LAURIA NEL MANOSCRITTO OTTOCENTESCO DI MAZZÀRIO
Published 2019-11-01“…The manuscript tells the rare case of a trip outside the schemes of the Grand Tour: while the wealthy northern Europeans visited Italy, he makes a six-month trip to Europe, a cultural rematch, between refined ceremonies and educated aristocrats, fleeting love affairs recorded in a ciphered code, evenings in the theaters of London and Paris, but also in museums, churches, halls of parliament and university lectures, with an eye to the industrial and social development of each country.…”
Get full text
Article -
2080
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
Published 2019“…The core of chaos-based cryptography is the selection of a good chaotic system. Most of chaotic ciphers have neglected the investigation of existence multistability in the employed chaotic systems. …”
Get full text
Thesis