-
2101
La poética deseada por Cervantes o el arte de la voz en el Quijote
Published 2017-01-01“…The art of voice in Don Quixote is ciphered in a corpus of didascalias which when in control of the resonant reading’s actio —still prevailing in the first half of the 17th century— guides the listener’s reception. …”
Get full text
Article -
2102
Juodosios moters savikūra Gayl Jones romane Evos vyras | Black Woman’s Self-Creation in Gayl Jones’s Novel Eva’s Man
Published 2005-01-01“…The black narrator’s text transforms the traditional canon of woman as ground, her body as the blank page and subjugates the black male body to secure her ciphers on it as her own text. It has been stressed that the woman’s conscious conversion into the subject and the creator enables her to translate the man into the object.…”
Get full text
Article -
2103
The Application of Compiler-based Obfuscation and Diversification for Program Signature Modification
Published 2018-10-01“…Implemented transformations are bogus code insertion, function permutation, instruction substitution, ciphering of constant buffer. As a result we demonstrate proof-of-concept examples which confirm that it is possible to automatically change of program signature for avoiding detection by signature-based analysis. …”
Get full text
Article -
2104
Weak RSA Keys Discovery on GPGPU
Published 2019-02-01“…We address one of the weaknesses of the RSA ciphering systems i.e. the existence of the private keys that are relatively easy to compromise by the attacker. …”
Get full text
Article -
2105
A Framework for Fine-Grained Nonlinearity Optimization of Boolean and Vectorial Boolean Functions
Published 2021-01-01“…Boolean functions and vectorial Boolean functions (S-boxes) are widely used cryptographic primitives for achieving cryptanalytic resistance of modern block or stream ciphers. In the aspect of information security, one of the most desirable characteristics a given S-box should possess is a high nonlinearity. …”
Get full text
Article -
2106
Security of Quantum Key Distribution
Published 2016-01-01“…In the Appendixes, we provide a brief outline of the history of some major QKD security proofs, a rather unfavorable comparison of current QKD proven security with that of conventional symmetric key ciphers, and a list of objections and answers concerning some major points of this paper.…”
Get full text
Article -
2107
A White-Box Implementation of IDEA
Published 2021-06-01“…In traditional white-box implementations of existing block ciphers, S-boxes are always converted into encoded lookup tables. …”
Get full text
Article -
2108
Isap v2.0
Published 2020-06-01“…Isap v2.0 is a candidate in NIST’s LightWeight Cryptography (LWC) project, which aims to identify and standardize authenticated ciphers that are well-suited for applications in constrained environments. …”
Get full text
Article -
2109
Silk Road Influences on the Art of Seals: A Study of the Song Yuan Huaya
Published 2018-08-01“…Song Yuan Huaya (the Huaya of the Song and Yuan Dynasties) is a type of seal featuring figurative patterns and sometimes decorated with ciphered or ethnic characters. Their origins are the Song and Yuan Dynasties, although their influence extends to the Ming (1368–1644 CE) and Qing (1644–1912 CE) Dynasties. …”
Get full text
Article -
2110
A Novel DFA on AES: Based on Two–Byte Fault Model with Discontiguous Rows
Published 2023-07-01“…Differential fault attack (DFA) is a distinctive methodology for acquiring the key to block ciphers, which comprises two distinct strategies: DFA on the state and DFA on the key schedule. …”
Get full text
Article -
2111
A New Audio Steganography System Based on Auto-Key Generator
Published 2012-02-01“…To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested system used self crypto-hiding pseudo random key generator. …”
Get full text
Article -
2112
MAKE-IT—A Lightweight Mutual Authentication and Key Exchange Protocol for Industrial Internet of Things
Published 2020-09-01“…We have used various cryptography operations such as hashing, ciphering, and so forth, for providing secure mutual authentication and secret key exchange between different entities to restrict unauthorized access. …”
Get full text
Article -
2113
Program sketching
Published 2017“…The result is a synthesis procedure that is able to handle complex problems from a variety of domains including ciphers, scientific programs, and even concurrent data-structures.…”
Get full text
Get full text
Article -
2114
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens
Published 2021“…We also show a more efficient protocol, based only on standard symmetric-key primitives (block ciphers and collision-resistant hash functions), that can be used if a bounded number of OTs suffice. …”
Get full text
Article -
2115
Enabling 3-share threshold implementations for all 4-bit S-boxes
Published 2014“…Furthermore, we use our new methodology in combination with decomposition to optimize ciphers utilizing many different S-boxes, and, to highlight the strength of our new methodology, we construct a 3-share Threshold Implementation of SERPENT which was believed to be not possible until now. …”
Get full text
Get full text
Get full text
Conference Paper -
2116
A novel energy efficient key distribution scheme for mobile WiMAX networks
Published 2017“…The MSs need to perform ciphering operations to access the keys upon rekeying process. …”
Get full text
Article -
2117
Los entornos de validación en la resolución de problemas matemáticos
Published 2012-11-01“…Different problems were solved so as to promote mathematical signs and symbols (ciphers, letters, variables, graphics, diagrams, visualisations, etc.), and social signs and symbols (in the frame of the classroom culture: hidden hints, remarks, reinforcements, confirmations, reflections, etc.) made by the teacher, and comments and remarks of similar types made by other students. …”
Get full text
Article -
2118
Single Neuronal Dynamical System in Self-Feedbacked Hopfield Networks and Its Application in Image Encryption
Published 2021-04-01“…Due to excellent chaotic dynamic behavior, self-feedbacked Hopfield networks have been used to design image ciphers. However, Self-feedbacked Hopfield networks have complex structures, large computational amount and fixed parameters; these properties limit the application of them. …”
Get full text
Article -
2119
A Blockchain-Based Secure Image Encryption Scheme for the Industrial Internet of Things
Published 2020-02-01“…Based on the number of pixels change rate (NPCR), the unified averaged changed intensity (UACI), and information entropy analysis, we evaluate the strength of proposed image encryption algorithm ciphers with respect to differential attacks. We obtained entropy values near to an ideal value of 8, which is considered to be safe from brute force attack. …”
Get full text
Article -
2120
Evolving Dynamic S-Boxes Using Fractional-Order Hopfield Neural Network Based Scheme
Published 2020-06-01“…Static substitution-boxes in fixed structured block ciphers may make the system vulnerable to cryptanalysis. …”
Get full text
Article