Showing 2,121 - 2,140 results of 2,263 for search '"cipher"', query time: 0.12s Refine Results
  1. 2121

    Neutrosophic Model for Evaluation Healthcare Security Criteria for Powerful and Lightweight Secure Storage System in Cloud-Based E-Healthcare Services by Ahmed A. El-Douh, Song Feng Lu, Ahmed Abdelhafeez, Ahmed M. Ali, Alber S. Aziz

    Published 2023-10-01
    “…The key derivation ensures end-to-end data. ciphering to prevent unauthorized use (KDF). This work provides robust security solutions for various environments. …”
    Get full text
    Article
  2. 2122

    STFTP: Secure TFTP Protocol for Embedded Multi-Agent Systems Communication by ZAGAR, D., HORVAT, G., MARTINOVIC, G.

    Published 2013-05-01
    “…Communication is analyzed for authentication, data rate and transfer time versus various data encryption ciphers and files sizes. STFTP results in an expected drop in performance, which is in the range of similar encryption algorithms. …”
    Get full text
    Article
  3. 2123

    Conditional Linear Cryptanalysis – Cryptanalysis of DES with Less Than 242 Complexity by Eli Biham, Stav Perle

    Published 2018-09-01
    “…We present several types of such conditions, including one that is especially useful for the analysis of Feistel ciphers. We exemplify the usage of such conditions for attacks by a careful application of our extension to Matsui’s attack on the full 16-round DES, which succeeds to reduce the complexity of the best attack on DES to less than 242. …”
    Get full text
    Article
  4. 2124

    On the Design of Chaos-Based S-Boxes by Miroslav M. Dimitrov

    Published 2020-01-01
    “…Substitution boxes (S-boxes) are critical nonlinear elements to achieve cryptanalytic resistance of modern block and stream ciphers. Given their importance, a rich variety of S-box construction strategies exists. …”
    Get full text
    Article
  5. 2125

    Hiding Colored Digital Images in Audio and Video Files Using Neural Networks

    Published 2013-08-01
    “…The first one is hiding the message in the cover to produce embedded cover (stego-cover). The second one is ciphering the embedded cover using GRNN Neural Network. …”
    Get full text
    Article
  6. 2126

    A novel medical image protection scheme using a 3-dimensional chaotic system. by Chong Fu, Gao-Yuan Zhang, Ou Bian, Wei-Min Lei, Hong-Feng Ma

    Published 2014-01-01
    “…To address the security and efficiency problems encountered by many existing permutation-diffusion type image ciphers, the new scheme utilizes a single 3D chaotic system, Chen's chaotic system, for both permutation and diffusion. …”
    Get full text
    Article
  7. 2127

    Partial Encryption in Digital Image Based On Plasma Encoding Techniques by Hala Abdul Wahab, Sura Sarab

    Published 2014-12-01
    “…In this paper a new approach is proposed for partial encryption in digital image based on dragging the longest wavelength color in digital image then input the extract color to the plasma encoding algorithm to have partial ciphered image that can be deciphered at the recipient side using the proposed retrieve algorithm. …”
    Get full text
    Article
  8. 2128

    Improvements of the xAAL Home Automation System by Christophe Lohr, Jérôme Kerdreux

    Published 2020-06-01
    “…It also discusses alternatives and all aspects that led us to make structuring choices: CBOR messages on an IP multicast channel, intranet communication, ciphering with Poly1305/Chacha20, structured and extensible abstract device description, and a distributed system architecture.…”
    Get full text
    Article
  9. 2129

    An Efficient and Secure Alert System for VANETs to Improve Crosswalks’ Security in Smart Cities by João Branquinho, Carlos Senna, André Zúquete

    Published 2020-04-01
    “…NAC minimizes the usage of asymmetric ciphers, which are fundamental to assure non-repudiation but increase performance penalties and uses hash chaining for source authentication of implicit messages.…”
    Get full text
    Article
  10. 2130

    Boolean Masking for Arithmetic Additions at Arbitrary Order in Hardware by Florian Bache, Tim Güneysu

    Published 2022-02-01
    “…Modular addition is an important component of many cryptographic algorithms such as ARX-ciphers and lattice-based post-quantum secure schemes. …”
    Get full text
    Article
  11. 2131

    Evaluation of Image Cryptography by Using Secret Session Key and SF Algorithm by Noor Kareem Jumaa, Abbas Muhammed Allawy

    Published 2023-12-01
    “…Second, it involves the ciphering of the secret image using the SF algorithm. …”
    Get full text
    Article
  12. 2132
  13. 2133

    Triplex: an Efficient and One-Pass Leakage-Resistant Mode of Operation by Yaobin Shen, Thomas Peters, François-Xavier Standaert, Gaëtan Cassiers, Corentin Verhamme

    Published 2022-08-01
    “… This paper introduces and analyzes Triplex, a leakage-resistant mode of operation based on Tweakable Block Ciphers (TBCs) with 2n-bit tweaks. Triplex enjoys beyond-birthday ciphertext integrity in the presence of encryption and decryption leakage in a liberal model where all intermediate computations are leaked in full and only two TBC calls operating a long-term secret are protected with implementationlevel countermeasures. …”
    Get full text
    Article
  14. 2134

    Reversible Data Hiding Scheme Based on VQ Prediction and Adaptive Parametric Binary Tree Labeling for Encrypted Images by Shuying Xu, Ji-Hwei Horng, Chin-Chen Chang

    Published 2021-01-01
    “…Furthermore, the VQ index and the secret data are stream ciphered to avoid leakage of the image content and secret information. …”
    Get full text
    Article
  15. 2135

    Triplex: an Efficient and One-Pass Leakage-Resistant Mode of Operation by Yaobin Shen, Thomas Peters, François-Xavier Standaert, Gaëtan Cassiers, Corentin Verhamme

    Published 2022-08-01
    “… This paper introduces and analyzes Triplex, a leakage-resistant mode of operation based on Tweakable Block Ciphers (TBCs) with 2n-bit tweaks. Triplex enjoys beyond-birthday ciphertext integrity in the presence of encryption and decryption leakage in a liberal model where all intermediate computations are leaked in full and only two TBC calls operating a long-term secret are protected with implementationlevel countermeasures. …”
    Get full text
    Article
  16. 2136

    Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions by Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki

    Published 2017-02-01
    “…We show generic attacks on unbalanced Feistel ciphers based on the meet-in-the-middle technique. …”
    Get full text
    Article
  17. 2137

    Feature selection methods for non-profiled side-channel attacks on ECC by Bhasin, Shivam, Ravi, Prasanna, Jungk, Bernhard, Jap, Dirmanto, Najm, Zakaria

    Published 2019
    “…Indeed, side-channel attacks have been reported to break even the theoretically secure ciphers due to the exploit in the physical leakage. …”
    Get full text
    Get full text
    Conference Paper
  18. 2138

    Hybrid encryption technique: Integrating the neural network with distortion techniques by Raed Abu Zitar, Muhammed J. Al-Muhammed

    Published 2022-01-01
    “…The second layer reverses the impact of the first layer by generating weights that are used to restore the original plaintext block from the ciphered one. The distortion stage imposes further confusion on the ciphertext by applying a set of distortion and substitution operations whose functionality is fully controlled by random numbers generated by a key-based random number generator. …”
    Get full text
    Article
  19. 2139

    Hybrid encryption technique: Integrating the neural network with distortion techniques. by Raed Abu Zitar, Muhammed J Al-Muhammed

    Published 2022-01-01
    “…The second layer reverses the impact of the first layer by generating weights that are used to restore the original plaintext block from the ciphered one. The distortion stage imposes further confusion on the ciphertext by applying a set of distortion and substitution operations whose functionality is fully controlled by random numbers generated by a key-based random number generator. …”
    Get full text
    Article
  20. 2140

    On Generalized Solutions of Linear Congruence ax = b (mod n) for Large Modulus n by Polemer M. Cuarto

    Published 2018-01-01
    “…In cryptography, the concept of linear congruence is used to directly underpin public key cryptosystems during the process of ciphering and deciphering codes. Thus, linear congruence plays a very important role in cryptography. …”
    Get full text
    Article