Showing 2,141 - 2,160 results of 2,263 for search '"cipher"', query time: 0.20s Refine Results
  1. 2141

    Hiding & Retrieval of Encrypted Data in an Image Using XOR Based on RBF and GRNN Networks and Comparison between their Performance

    Published 2013-08-01
    “…The first one is hiding the message in the cover to produce stego-cover image. The second one is ciphering the embedded image using RBF Neural Network or GRNN. …”
    Get full text
    Article
  2. 2142

    Proposing packet-key based end-to-end security architecture for the post-LTE networks by Akanksha Saini, Enrique Festijo, Younchan Jung

    Published 2019-06-01
    “…This paper proposes the end-to-end security scheme with packet key mechanism to perform ciphering of user traffic between two User Equipments (UEs) attached to the different Long Term Evolution (LTE) networks. …”
    Get full text
    Article
  3. 2143

    Integrate the hierarchical cluster elliptic curve key agreement with multiple secure data transfer modes into wireless sensor networks by Hua Yi Lin

    Published 2022-12-01
    “…Hence, efficient key management schemes with lightweight ciphers are essential. Many asymmetric keys or public key mechanisms have been developed. …”
    Get full text
    Article
  4. 2144

    Sexual Socialization: A Seamless Approach in De-emphasizing Rape Scourge in Nigeria by Babatope Matthew Ajiboye

    Published 2021-02-01
    “…This scourge has unmasked its ugly face; of no value nakedness and spiteful fang on the nation in no undersized gauge, thereby consuming and reducing her women-folk to nothing but ciphers of humanity even in their own home; their dignity alienated, emotionally and psychologically dehumanized, made to struggle with societal stigmatization and above all, condemned to a lifetime melancholy trauma. …”
    Get full text
    Article
  5. 2145

    A Security Enhanced Encryption Scheme and Evaluation of Its Cryptographic Security by Miodrag J. Mihaljević

    Published 2019-07-01
    “…This paper proposes the encryption-decryption paradigm for the security enhancement of lightweight block ciphers based on dedicated error-correction coding and a simulator of the deletion channel controlled by the secret key. …”
    Get full text
    Article
  6. 2146
  7. 2147

    Chaos Based Cryptography An Alternative to Algebraic Cryptography by Kamel Ariffin, Muhammad Rezal

    Published 2008
    “…Introduced by Baptista in 1998, it is able to produce different ciphers for the same plaintext. It was cracked by Alvarez in 2003 via the one-time pad attack. …”
    Get full text
    Article
  8. 2148

    Improving the Statistical Qualities of Pseudo Random Number Generators by Rafael Álvarez, Francisco Martínez, Antonio Zamora

    Published 2022-01-01
    “…Taking inspiration from techniques employed in symmetric ciphers, it is based on four seed-dependent substitution boxes, an evolving internal state register, and the combination of different types of operations with the aim of diffusing nonrandom patterns in the input sequence. …”
    Get full text
    Article
  9. 2149

    A Novel Delay Linear Coupling Logistics Map Model for Color Image Encryption by Shouliang Li, Weikang Ding, Benshun Yin, Tongfeng Zhang, Yide Ma

    Published 2018-06-01
    “…It is illustrated by simulation results that the ciphered images have good pseudo randomness through our method. …”
    Get full text
    Article
  10. 2150

    A Countermeasure against DPA on SIMON with an Area-Efficient Structure by Yuanyuan Zhang, Ning Wu, Fang Zhou, Jinbao Zhang, Muhammad Rehan Yahya

    Published 2019-02-01
    “…Differential power analysis (DPA) is an effective side channel attack method, which poses a critical threat to cryptographic algorithms, especially lightweight ciphers such as SIMON. In this paper, we propose an area-efficient countermeasure against DPA on SIMON based on the power randomization. …”
    Get full text
    Article
  11. 2151

    New Differentially 4-Uniform Piecewise Permutations over <inline-formula><math display="inline"><semantics><msub><mi mathvariant="double-struck">F</mi><msup><mn>2</mn><mrow><mn>2</... by Shuai Li, Li Miao

    Published 2023-01-01
    “…Permutations with low differential uniformity, high nonlinearity and high algebraic degree over <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mi mathvariant="double-struck">F</mi><msup><mn>2</mn><mrow><mn>2</mn><mi>k</mi></mrow></msup></msub></semantics></math></inline-formula> are preferred substitution boxes in modern block ciphers. In this paper, we study the bijectivity and the difference uniformity of piecewise function with the help of permutation group theory. …”
    Get full text
    Article
  12. 2152

    Generation of Nonlinear Substitutions by Simulated Annealing Algorithm by Alexandr Kuznetsov, Mikolaj Karpinski, Ruslana Ziubina, Sergey Kandiy, Emanuele Frontoni, Oleksandr Peliukh, Olga Veselska, Ruslan Kozak

    Published 2023-04-01
    “…In particular, the strength of symmetric ciphers to linear cryptanalysis is directly related to the nonlinearity of substitution. …”
    Get full text
    Article
  13. 2153

    Lightweight AEAD and Hashing using the Sparkle Permutation Family by Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Qingju Wang

    Published 2020-06-01
    “…These are combined with the Beetle mode to construct a family of authenticated ciphers, Schwaemm, with security levels ranging from 120 to 250 bits. …”
    Get full text
    Article
  14. 2154

    Design, FPGA-based Implementation and Performance of a Pseudo Random Number Generator of Chaotic Sequences by DRIDI, F., EL ASSAD, S., EL HADJ YOUSSEF, W., MACHHOUT, M., SAMHAT, A. E.

    Published 2021-05-01
    “…Pseudo-Random Number Generator of Chaotic Sequences (PRNG-CS) has caught the attention in various security applications, especially for stream and block ciphering, steganography, and digital watermarking algorithms. …”
    Get full text
    Article
  15. 2155

    Mixture Differential Cryptanalysis: a New Approach to Distinguishers and Attacks on round-reduced AES by Lorenzo Grassi

    Published 2018-06-01
    “…In this paper we introduce “Mixture Differential Cryptanalysis” on round-reduced AESlike ciphers, a way to translate the (complex) “multiple-of-8” 5-round distinguisher into a simpler and more convenient one (though, on a smaller number of rounds). …”
    Get full text
    Article
  16. 2156

    The Image of the Land and Its Functions in Tolstoy’s Novel Resurrection by Valeria G. Andreeva

    Published 2020-09-01
    “…The image of the land is ciphered in the description of the severity of prisoners’ life and Nekhlyudov’s attempts to help the prisoners. …”
    Get full text
    Article
  17. 2157

    On the price of priceless goods. Sociological Observations on and around Art Basel by Franz Schultheis

    Published 2017-02-01
    “…Today’s public discourse on art revolves around the price of these priceless goods and numbers function as ciphers for the collective representations of art and its status in late capitalist society. …”
    Get full text
    Article
  18. 2158

    Improved guess-and-determine and distinguishing attacks on SNOW-V by Jing Yang, Thomas Johansson, Alexander Maximov

    Published 2021-09-01
    “…These attacks do not threaten SNOW-V, but provide more in-depth details for understanding its security and give new ideas for cryptanalysis of other ciphers.…”
    Get full text
    Article
  19. 2159

    Identity as Liminality in Post-Colonial Fiction: Nadine Gordimer.’s The Pickup and Bessie Head.’s A Question of Power by José Luis Venegas Caro de la Barrera

    Published 2017-03-01
    “…Abstract: This paper sets out to analyze the interstitial/liminal aspect of postcolonial literature as ciphered in the narratives of Nadine Gordimer and Bessie Head. …”
    Get full text
    Article
  20. 2160

    MDS Matrices with Lightweight Circuits by Sébastien Duval, Gaëtan Leurent

    Published 2018-06-01
    “…MDS matrices are an important element for the design of block ciphers such as the AES. In recent years, there has been a lot of work on the construction of MDS matrices with a low implementation cost, in the context of lightweight cryptography. …”
    Get full text
    Article