Showing 2,101 - 2,120 results of 2,263 for search '"cipher"', query time: 0.13s Refine Results
  1. 2101

    La poética deseada por Cervantes o el arte de la voz en el Quijote by Gustavo Illades Aguiar

    Published 2017-01-01
    “…The art of voice in Don Quixote is ciphered in a corpus of didascalias which when in control of the resonant reading’s actio —still prevailing in the first half of the 17th century— guides the listener’s reception. …”
    Get full text
    Article
  2. 2102

    Juodosios moters savikūra Gayl Jones romane Evos vyras | Black Woman’s Self-Creation in Gayl Jones’s Novel Eva’s Man by Rasa Juozapaitytė

    Published 2005-01-01
    “…The black narrator’s text transforms the traditional canon of woman as ground, her body as the blank page and subjugates the black male body to secure her ciphers on it as her own text. It has been stressed that the woman’s conscious conversion into the subject and the creator enables her to translate the man into the object.…”
    Get full text
    Article
  3. 2103

    The Application of Compiler-based Obfuscation and Diversification for Program Signature Modification by A. R. Nurmukhametov

    Published 2018-10-01
    “…Implemented transformations are bogus code insertion, function permutation, instruction substitution, ciphering of constant buffer. As a result we demonstrate proof-of-concept examples which confirm that it is possible to automatically change of program signature for avoiding detection by signature-based analysis. …”
    Get full text
    Article
  4. 2104

    Weak RSA Keys Discovery on GPGPU by Przemysław Karbownik, Paweł Russek, Kazimierz Wiatr

    Published 2019-02-01
    “…We address one of the weaknesses of the RSA ciphering systems i.e. the existence of the private keys that are relatively easy to compromise by the attacker. …”
    Get full text
    Article
  5. 2105

    A Framework for Fine-Grained Nonlinearity Optimization of Boolean and Vectorial Boolean Functions by Miroslav M. Dimitrov

    Published 2021-01-01
    “…Boolean functions and vectorial Boolean functions (S-boxes) are widely used cryptographic primitives for achieving cryptanalytic resistance of modern block or stream ciphers. In the aspect of information security, one of the most desirable characteristics a given S-box should possess is a high nonlinearity. …”
    Get full text
    Article
  6. 2106

    Security of Quantum Key Distribution by Horace P. Yuen

    Published 2016-01-01
    “…In the Appendixes, we provide a brief outline of the history of some major QKD security proofs, a rather unfavorable comparison of current QKD proven security with that of conventional symmetric key ciphers, and a list of objections and answers concerning some major points of this paper.…”
    Get full text
    Article
  7. 2107

    A White-Box Implementation of IDEA by Siyu Pang, Tingting Lin, Xuejia Lai, Zheng Gong

    Published 2021-06-01
    “…In traditional white-box implementations of existing block ciphers, S-boxes are always converted into encoded lookup tables. …”
    Get full text
    Article
  8. 2108

    Isap v2.0 by Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Bart Mennink, Robert Primas, Thomas Unterluggauer

    Published 2020-06-01
    “…Isap v2.0 is a candidate in NIST’s LightWeight Cryptography (LWC) project, which aims to identify and standardize authenticated ciphers that are well-suited for applications in constrained environments. …”
    Get full text
    Article
  9. 2109

    Silk Road Influences on the Art of Seals: A Study of the Song Yuan Huaya by Andrea Jian Chen

    Published 2018-08-01
    “…Song Yuan Huaya (the Huaya of the Song and Yuan Dynasties) is a type of seal featuring figurative patterns and sometimes decorated with ciphered or ethnic characters. Their origins are the Song and Yuan Dynasties, although their influence extends to the Ming (1368–1644 CE) and Qing (1644–1912 CE) Dynasties. …”
    Get full text
    Article
  10. 2110

    A Novel DFA on AES: Based on Two–Byte Fault Model with Discontiguous Rows by Xusen Wan, Jinbao Zhang, Shi Cheng, Weixiang Wu, Jiehua Wang

    Published 2023-07-01
    “…Differential fault attack (DFA) is a distinctive methodology for acquiring the key to block ciphers, which comprises two distinct strategies: DFA on the state and DFA on the key schedule. …”
    Get full text
    Article
  11. 2111

    A New Audio Steganography System Based on Auto-Key Generator by Inas Jawad Kadhim

    Published 2012-02-01
    “…To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested system used self crypto-hiding pseudo random key generator. …”
    Get full text
    Article
  12. 2112

    MAKE-IT—A Lightweight Mutual Authentication and Key Exchange Protocol for Industrial Internet of Things by Karanjeet Choudhary, Gurjot Singh Gaba, Ismail Butun, Pardeep Kumar

    Published 2020-09-01
    “…We have used various cryptography operations such as hashing, ciphering, and so forth, for providing secure mutual authentication and secret key exchange between different entities to restrict unauthorized access. …”
    Get full text
    Article
  13. 2113

    Program sketching by Solar Lezama, Armando

    Published 2017
    “…The result is a synthesis procedure that is able to handle complex problems from a variety of domains including ciphers, scientific programs, and even concurrent data-structures.…”
    Get full text
    Get full text
    Article
  14. 2114

    (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens by Choi, Seung G, Katz, Jonathan, Schröder, Dominique, Yerukhimovich, Arkady, Zhou, Hong-Sheng

    Published 2021
    “…We also show a more efficient protocol, based only on standard symmetric-key primitives (block ciphers and collision-resistant hash functions), that can be used if a bounded number of OTs suffice. …”
    Get full text
    Article
  15. 2115

    Enabling 3-share threshold implementations for all 4-bit S-boxes by Kutzner, Sebastian, Nguyen, Phuong Ha, Poschmann, Axel

    Published 2014
    “…Furthermore, we use our new methodology in combination with decomposition to optimize ciphers utilizing many different S-boxes, and, to highlight the strength of our new methodology, we construct a 3-share Threshold Implementation of SERPENT which was believed to be not possible until now. …”
    Get full text
    Get full text
    Get full text
    Conference Paper
  16. 2116

    A novel energy efficient key distribution scheme for mobile WiMAX networks by Gilanian Sadeghi, Mohammad Mehdi, Mohd Ali, Borhanuddin, Ma, Maode, Ab Manan, Jamalul-lail

    Published 2017
    “…The MSs need to perform ciphering operations to access the keys upon rekeying process. …”
    Get full text
    Article
  17. 2117

    Los entornos de validación en la resolución de problemas matemáticos by Alida Mónica Masachs, Germán Edgardo Camprubí, Mauricio Naudi

    Published 2012-11-01
    “…Different problems were solved so as to promote mathematical signs and symbols (ciphers, letters, variables, graphics, diagrams, visualisations, etc.), and social signs and symbols (in the frame of the classroom culture: hidden hints, remarks, reinforcements, confirmations, reflections, etc.) made by the teacher, and comments and remarks of similar types made by other students. …”
    Get full text
    Article
  18. 2118

    Single Neuronal Dynamical System in Self-Feedbacked Hopfield Networks and Its Application in Image Encryption by Xitong Xu, Shengbo Chen

    Published 2021-04-01
    “…Due to excellent chaotic dynamic behavior, self-feedbacked Hopfield networks have been used to design image ciphers. However, Self-feedbacked Hopfield networks have complex structures, large computational amount and fixed parameters; these properties limit the application of them. …”
    Get full text
    Article
  19. 2119

    A Blockchain-Based Secure Image Encryption Scheme for the Industrial Internet of Things by Prince Waqas Khan, Yungcheol Byun

    Published 2020-02-01
    “…Based on the number of pixels change rate (NPCR), the unified averaged changed intensity (UACI), and information entropy analysis, we evaluate the strength of proposed image encryption algorithm ciphers with respect to differential attacks. We obtained entropy values near to an ideal value of 8, which is considered to be safe from brute force attack. …”
    Get full text
    Article
  20. 2120

    Evolving Dynamic S-Boxes Using Fractional-Order Hopfield Neural Network Based Scheme by Musheer Ahmad, Eesa Al-Solami

    Published 2020-06-01
    “…Static substitution-boxes in fixed structured block ciphers may make the system vulnerable to cryptanalysis. …”
    Get full text
    Article