Showing 2,061 - 2,080 results of 2,263 for search '"cipher"', query time: 0.60s Refine Results
  1. 2061

    Enhancing secured data hiding using dynamic digital signature for authentication purpose by Mohd. Daud, Salwani, Noroozi, Erfaneh, Sabouhi, Ali

    Published 2014
    “…However, two issues that required to be addressed are large size of the ciphered data in digital signature and making it closer to the original file. …”
    Article
  2. 2062

    Жизнефрения Всеволода Некрасова by Jana Kitzlerová

    Published 2022-06-01
    “…However, it also considers the more general question of whether it is possible to transpose poetry full of delicate humour, hidden allusions, codes and ciphers into another language in such a way that the reader would not be deprived of the aesthetic impression of the original. …”
    Get full text
    Article
  3. 2063

    An Absolutely Patient Action: The Translator as a Figure of Ethical Communication by Margaret Schwartz

    Published 2011-12-01
    “…And the translator’s task is always impossible, insofar as total respect (ciphered as total fidelity) gives way to what is inevitably “lost in translation.” …”
    Get full text
    Article
  4. 2064

    The organization of the statistical account of readers by Koval Tetiana, Turovska Lesia, Shevchenko Iryna

    Published 2019-01-01
    “…It enabled to count readers in an automated mode, operate statistics, differentiate readers by professional categories, ciphers of a specialty, education, age, gender, etc., which positively affected the formation of a modern method of studying the reader contingent. …”
    Get full text
    Article
  5. 2065
  6. 2066

    Security in robot operating system (ROS) by using Advanced Encryption Standard (AES) by Nor Alia Syuhada, Shaharudin

    Published 2018
    “…The study investigates a robot’s performance when ciphering the messages interchanged between ROS nodes under the publish/subscribe paradigm. …”
    Get full text
    Undergraduates Project Papers
  7. 2067

    RSA ENCRYPTION USING VLSI ARCHITECTURE FOR HIGH SPEED APPLICATIONS by Salai Thillai Thilagam J

    Published 2017-12-01
    “…To overcome such illegal access the security of modern computer systems uses public-ciphers key namely Rivest, Shamir and Adleman (RSA). …”
    Get full text
    Article
  8. 2068

    An Evaluation of Power Consumption Gain and Security of Flexible Green Pool Mining in Public Blockchain Systems by Miodrag J. Mihaljević , Milan Todorović, Milica Knežević 

    Published 2023-04-01
    “…The novelty of the proposed architecture lies in the employment of an innovative cryptographic puzzle that is based on stream ciphering. This enables flexibility in setting the difficulty parameter of the protocol, and allows for the separation of the energy and memory resources that are required for the puzzle solving. …”
    Get full text
    Article
  9. 2069

    A Novel Algorithm of Constructing Highly Nonlinear S-p-boxes by Yasir Naseer, Tariq Shah, Dawood Shah, Sadam Hussain

    Published 2019-01-01
    “…The role of substitution boxes is very important in block ciphers. Substitution boxes are utilized to create confusion in the cryptosystem. …”
    Get full text
    Article
  10. 2070

    Construction of S-Box Based on Chaotic Map and Algebraic Structures by Iqtadar Hussain, Amir Anees, Temadher Alassiry Al-Maadeed, Muhammad Tahir Mustafa

    Published 2019-03-01
    “…The substitution box (S-box) is the main component of many modern symmetric encryption ciphers that provides confusion between the secret key and ciphertext. …”
    Get full text
    Article
  11. 2071

    Adaptation of a genetic operator and a dynamic S-box for chaotic encryption of medical and color images by Younes Qobbi, Abdellah Abid, Mariem Jarjar, Samir El Kaddouhi, Abdellatif Jarjar, Abdelhamid Benazzi

    Published 2023-03-01
    “…A passage in hexadecimal notation is carried out on the values of the pixels of the original image, followed by a subdivision of the vector obtained into sub-blocks of size 1×6, for a future submission to two rounds of genetic mutation adapted to ciphers of color images and controlled by chaotic vectors. …”
    Get full text
    Article
  12. 2072

    Hybrid hiding in multimedia files by Farah Mohammed

    Published 2012-07-01
    “…The principle of hybrid information hiding represented by process of information hiding  message (multimedia files) embedded inside another message which is depended on hiding a certain media in another media using different domains (special domain, frequency domain) to provide protection and security for transformed data,  this paper  suggest an algorithm by using two different files first one compressed binary image, the compression method is run-length and hided this file inside the hostage media by use frequency domain which is represented by Discrete cosine transform (DCT), the second is text ciphered by Caesar method which is depended one secret key by using spatial domain. …”
    Get full text
    Article
  13. 2073

    Research Status of Nonlinear Feedback Shift Register Based on Semi-Tensor Product by Zhe Gao, Jun-e Feng

    Published 2022-09-01
    “…Nonlinear feedback shift registers (NFSRs) are the main components of stream ciphers and convolutional decoders. Recent years have seen an increase in the requirement for information security, which has sparked NFSR research. …”
    Get full text
    Article
  14. 2074

    Lightweight Diffusion Layer: Importance of Toeplitz Matrices by Sumanta Sarkar, Habeeb Syed

    Published 2016-12-01
    “…MDS matrices are used as building blocks of diffusion layers in block ciphers, and XOR count is a metric that estimates the hardware implementation cost. …”
    Get full text
    Article
  15. 2075

    Provably Secure Encryption Schemes With Zero Setup and Linear Speed by Using Rubik’s Cubes by Ping Pan, Yun Pan, Zhen Wang, Licheng Wang

    Published 2020-01-01
    “…Different from most naive designs of permutation ciphers based on Rubik's cubes, our proposals are probabilistic encryption schemes that combine some of the newest cryptographic primitives with modern coding theory. …”
    Get full text
    Article
  16. 2076

    Brute force searching, the typical set and Guesswork by Christiansen, Mark M., Duffy, Ken R., Medard, Muriel, Calmon, Flavio du Pin

    Published 2014
    “…It is tempting to use this property in cryptanalysis of computationally secure ciphers by assuming coded words are drawn from a source's typical set and so, for all intents and purposes, uniformly distributed within it. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 2077

    The Deoxys AEAD family by Jean, Jérémy, Nikolić, Ivica, Peyrin, Thomas, Seurin, Yannick

    Published 2022
    “…Deoxys uses a new family of tweakable block ciphers as internal primitive, Deoxys-TBC, which follows the TWEAKEY framework (Jean, Nikolić, and Peyrin, ASIACRYPT 2014) and relies on the AES round function. …”
    Get full text
    Journal Article
  18. 2078

    Online Detection and Reactive Countermeasure for leakage from BPU using TVLA by Bhattacharya, Sarani, Bhasin, Shivam, Mukhopadhyay, Debdeep

    Published 2018
    “…In recent years, performance counters have been used as a side channel source for the branch mispredictions which can be used to attack ciphers with user privileges. In this paper we propose an online leakage detection tool Branch-Monitor for branch misprediction traces which does an online detection of the leakage and raises an alarm if there exists a significant difference in the distribution of branch misses for selected inputs. …”
    Get full text
    Get full text
    Conference Paper
  19. 2079

    UN SENATORE AL GRAND TOUR: GIUSEPPE AURELIO LAURIA NEL MANOSCRITTO OTTOCENTESCO DI MAZZÀRIO by LUCA IRWIN FRAGALE

    Published 2019-11-01
    “…The manuscript tells the rare case of a trip outside the schemes of the Grand Tour: while the wealthy northern Europeans visited Italy, he makes a six-month trip to Europe, a cultural rematch, between refined ceremonies and educated aristocrats, fleeting love affairs recorded in a ciphered code, evenings in the theaters of London and Paris, but also in museums, churches, halls of parliament and university lectures, with an eye to the industrial and social development of each country.…”
    Get full text
    Article
  20. 2080

    Designing new chaotic and hyperchaotic systems for chaos-based cryptography by Kadhim, Al Karawi Hayder Natiq

    Published 2019
    “…The core of chaos-based cryptography is the selection of a good chaotic system. Most of chaotic ciphers have neglected the investigation of existence multistability in the employed chaotic systems. …”
    Get full text
    Thesis