Showing 2,201 - 2,220 results of 2,263 for search '"cipher"', query time: 0.13s Refine Results
  1. 2201

    Distributed Key Management to Secure IoT Wireless Sensor Networks in Smart-Agro by Safwan Mawlood Hussein, Juan Antonio López Ramos, José Antonio Álvarez Bermejo

    Published 2020-04-01
    “…In such scenario, symmetric-key ciphers are preferred for key management in WSN; key distribution is therefore an issue. …”
    Get full text
    Article
  2. 2202

    A New Automatic Tool Searching for Impossible Differential of NIST Candidate <i>ACE</i> by Jingyi Liu, Guoqiang Liu, Longjiang Qu

    Published 2020-09-01
    “…Based on the method of characteristic matrix, we build an automatic searching algorithm that can be used to search for structural impossible differentials and give the optimal permutation for <i>ACE</i> permutation and other SPN ciphers. We prove that there is no impossible differential of <i>ACE</i> permutation longer than 9 steps and construct two 8-step impossible differentials. …”
    Get full text
    Article
  3. 2203

    Big Data Provenance Using Blockchain for Qualitative Analytics via Machine Learning by Kashif Mehboob Khan, Warda Haider, Najeed Ahmed Khan, Darakhshan Saleem

    Published 2023-05-01
    “…Unauthorized access to the data is very challenging due to the ciphered and decentralized data preservation in the blockchain network. …”
    Get full text
    Article
  4. 2204

    Quantum-Resistant Cryptography for the Internet of Things Based on Location-Based Lattices by Ohood Saud Althobaiti, Mischa Dohler

    Published 2021-01-01
    “…Quantum computing, another emerging technological paradigm, promises novel compute opportunities but is also able to compromise cybersecurity ciphers. Therefore, improved methods to mitigate such security threats are needed. …”
    Get full text
    Article
  5. 2205

    Converting of Boolean Expression to Linear Equations, Inequalities and QUBO Penalties for Cryptanalysis by Aleksey I. Pakhomchik, Vladimir V. Voloshinov, Valerii M. Vinokur, Gordey B. Lesovik

    Published 2022-01-01
    “…The advantage of the proposed approach is that both methods reduce important cryptanalysis problems, such as the preimaging of hash functions or breaking symmetric ciphers as the MILP problems, which are solved by the generic MILP solvers. …”
    Get full text
    Article
  6. 2206

    A Novel Message-Preserving Scheme with Format-Preserving Encryption for Connected Cars in Multi-Access Edge Computing by Insu Oh, Taeeun Kim, Kangbin Yim, Sun-Young Lee

    Published 2019-09-01
    “…Therefore, in this paper, we propose a method for encrypting the data frame, including real data in the CAN message structure, using format-preserving encryption (FPE), which ensures that the plaintext and ciphertext have the same format and length. In this way, block ciphers such as AES-128 must be divided into two or three blocks, but FPE can be processed simultaneously by encrypting them according to the CAN message format, thus providing better security against denial-of-service attacks. …”
    Get full text
    Article
  7. 2207

    Proving Resistance Against Infinitely Long Subspace Trails: How to Choose the Linear Layer by Lorenzo Grassi, Christian Rechberger, Markus Schofnegger

    Published 2021-06-01
    “…Designing cryptographic permutations and block ciphers using a substitutionpermutation network (SPN) approach where the nonlinear part does not cover the entire state has recently gained attention due to favorable implementation characteristics in various scenarios. …”
    Get full text
    Article
  8. 2208

    Morphometric analysis of "pancitokeratin-positive" neoplastic lesions of the lymph nodes of the neck by O. V. Poslavska, I. S. Shponka, P. A. Hritsenko, O. A. Alekseenko

    Published 2017-12-01
    “…Squamous cell carcinomas of the head and neck have an accessible visualization and rare phenotypes that produce metastatic cells before the increase in the primary focus (only 2 of 41), therefore should not fall under the ciphers of cancers of unknown primary localization. …”
    Get full text
    Article
  9. 2209

    O fracasso da metafísica Uma exegese de algumas passagens da Psicologia das Visões de Mundo de Karl Jaspers by Gerson Brea

    Published 2016-12-01
    “…And in his last lecture, Jaspers takes up the theme again, discussing the ideas of “ciphers”, “transcendence”, “being in failure”. However, already in 1919, in his book Psychology of World Views, the concept of metaphysics appears in crucial moments. …”
    Get full text
    Article
  10. 2210

    Timestamp Estimation in P802.15.4z Amendment by Ioan Domuta, Tudor Petru Palade, Emanuel Puschita, Andra Pastrav

    Published 2020-09-01
    “…This paper analyses the key parts of PHY which have a great contribution in timestamp estimation precision, particularly: UWB pulse, channel sounding and timestamp estimation using ciphered sequence and frequency selective fading. Unlike EiR, where the UWB pulse is defined in the time domain, in this article, the UWB pulse is synthesized from the power spectral density mask, and it is shown that the use of the entire allocated spectrum results in a decrease in risetime, an increase in pulse amplitude, and an attenuation of lateral lobes. …”
    Get full text
    Article
  11. 2211

    Letters of Friedrich Christian Weber to John Robeson from Russia, 1718-1719 by I. I. Fedyukin, A. D. Novikova

    Published 2022-05-01
    “…The article examines various aspects of Weber's diplomatic activities, including the methods he used to collect information in Russia and send it to England, such as bribing Russian officials, resorting to secret agents, ciphers, sending dispatches “under the cover, and others. …”
    Get full text
    Article
  12. 2212

    The Student Library of the Kyiv Theological Seminary (History of Formation, Systematic Composition and Current State) by Hul Olga

    Published 2022-01-01
    “…A new source base of research has been involved, in particular, information on the catalog of books, which reveals the composition of the student library fund, has been put into scientific circulation.The attribution of books from this book collection was carried out, the historical location of books was reproduced in accordance with the ciphers preserved from the time of the library’s existence, and the system of book placement was analyzed. …”
    Get full text
    Article
  13. 2213

    JSE 31:4 Editorial by Stephen Braude

    Published 2017-12-01
    “…Roper argues that Sixteenth-Century techniques of using codes and ciphers were both common and quite well-developed, and that these permitted concealing secret messages within apparently innocent passages of prose or poetry. …”
    Get full text
    Article
  14. 2214

    Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home by Ziaur Rahman, Xun Yi, Mustain Billah, Mousumi Sumi, Adnan Anwar

    Published 2022-03-01
    “…Since the emergence of IoT, lightweight block ciphers have been a better option for intelligent and sensor-based applications. …”
    Get full text
    Article
  15. 2215

    Art for the Apocalypse: Sculpture by Frink in Losey’s The Damned by Susan Felleman

    Published 2014-07-01
    “…Freya Neilson (Viveca Lindfors) was conceived expressly to employ the work of sculptor Elisabeth Frink (1930-1993), whose scarred, distressed figural works of the period included anthropomorphic birds, winged men, fallen men, horse heads and other morbid ciphers of existential dread. In the film these works of plaster and bronze embody the age of anxiety even as they represent art as a redemptive alternative to the cold-bloodedness of both lowbrow Teddy Boy (Oliver Reed) and highbrow Government scientist (Alexander Knox). …”
    Get full text
    Article
  16. 2216

    STUDY OF HIGH-SPEED REALIZATION TECHNICS FOR ELEMENTS OF SYMMETRIC ENCRYPTION ALGORITHMS DURING CALCULATIONS ON GRAPHICS PROCESSOR by V. A. Udaltsov, N. S. Karmanovskiy

    Published 2018-07-01
    “…To achieve this goal, we considered LSX and ARX structures of block algorithms on the example of the following ciphers: AES, «Kuznyechik», LEA, Rectangle, Simon and Speck. …”
    Get full text
    Article
  17. 2217

    Exploring Integrity of AEADs with Faults: Definitions and Constructions by Sayandeep Saha, Mustafa Khairallah, Thomas Peyrin

    Published 2022-12-01
    “…For symmetric-key cryptography, a significant amount of exploration has taken place in this regard for primitives such as block ciphers. Concerning symmetric-key operating modes, such as Authenticated Encryption with Associated Data (AEAD), the stateof-the-art mainly addresses the passive Side-Channel Attacks (SCA) in the form of leakage resilient cryptography. …”
    Get full text
    Article
  18. 2218

    Exploring Differential-Based Distinguishers and Forgeries for ASCON by David Gerault, Thomas Peyrin, Quan Quan Tan

    Published 2021-09-01
    “…While MILP and SAT solvers are among the most popular tools to model ciphers and perform cryptanalysis, other methods with different performance profiles are appearing. …”
    Get full text
    Article
  19. 2219

    An Efficient Generation and Security Analysis of Substitution Box Using Fingerprint Patterns by Oznur Sengel, Muhammed Ali Aydin, Ahmet Sertbas

    Published 2020-01-01
    “…The keystone of the modern block and stream ciphers is the use of a substitution box (s-box) that obscures correlation between plaintext and ciphertext. …”
    Get full text
    Article
  20. 2220

    Applications of design theory for the constructions of MDS matrices for lightweight cryptography by Gupta Kishan Chand, Pandey Sumit Kumar, Ray Indranil Ghosh

    Published 2017-06-01
    “…Maximum distance separable (MDS) matrices have applications not only in coding theory but are also of great importance in the design of block ciphers and hash functions. It is nontrivial to find MDS matrices which could be used in lightweight cryptography. …”
    Get full text
    Article