Showing 2,221 - 2,240 results of 2,263 for search '"cipher"', query time: 0.12s Refine Results
  1. 2221

    Practical Related-Key Forgery Attacks on Full-Round TinyJAMBU-192/256 by Orr Dunkelman, Shibam Ghosh, Eran Lambooij

    Published 2023-06-01
    “…It is considered to be one of the more efficient ciphers in the competition and has undergone extensive analysis in recent years as both the keyed permutation as well as the mode are new designs. …”
    Get full text
    Article
  2. 2222

    On the Security Goals of White-Box Cryptography by Estuardo Alpirez Bock, Alessandro Amadori, Chris Brzuska, Wil Michiels

    Published 2020-03-01
    “…Thus, even strong assumptions such as indistinguishability obfuscation cannot be used to provide secure white-box implementations for arbitrary ciphers. Perhaps surprisingly, our impossibility result does not carry over to the hardware-bound scenario. …”
    Get full text
    Article
  3. 2223

    Breaking Masked Implementations with Many Shares on 32-bit Software Platforms by Olivier Bronchain, François-Xavier Standaert

    Published 2021-07-01
    “…We then show the positive impact of lightweight block ciphers with limited number of AND gates for side-channel security, and compare our attacks against a masked Clyde with the best reported attacks of the CHES 2020 CTF. …”
    Get full text
    Article
  4. 2224

    Design and implement a reverse key algorithm for the AES 128 bit cryptography by Cheng, Vjin

    Published 2015
    “…Since valuable information is present within encrypted data, cryptanalysis which is the study of ciphers with the aim of breaking the encryption is born. …”
    Get full text
    Final Year Project (FYP)
  5. 2225

    The rule of strangers: empire, Islam, and the invention of "politics" in Egypt, 1867–1914 by Omar, H

    Published 2016
    “…Colonial observers frequently suggested that Egyptians were 'political ciphers'. They pointed to the absence of abstract political theory in the post-Classical Islamicate world as evidence for that assertion. …”
    Thesis
  6. 2226

    Enhancing the strength of user's authentication using multifactor approach for use in mobile application system by Mohamed, Kartini, Sidi, Fatimah, A. Jabar, Marzanah, Ishak, Iskandar

    Published 2015
    “…Thus, this study propose a way to enhance the strength of an existing user's authentication with increase number of its multifactor elements and improve its text ciphering technique. Four apps have been developed and two tests namely functionality test and vulnerability test are carried out by an independent testing body to measure effectiveness the proposed enhancements. …”
    Get full text
    Conference or Workshop Item
  7. 2227

    Security on Plastics: Fake or Real? by Nele Mentens, Jan Genoe, Thomas Vandenabeele, Lynn Verschueren, Dirk Smets, Wim Dehaene, Kris Myny

    Published 2019-08-01
    “…By integrating cryptographic modules, we explore the limits of the technology, since the smallest lightweight block ciphers feature a larger area than the largest digital circuit on flex foil reported up to now. …”
    Get full text
    Article
  8. 2228

    Dynamic Multimedia Encryption Using a Parallel File System Based on Multi-Core Processors by Osama A. Khashan, Nour M. Khafajah, Waleed Alomoush, Mohammad Alshinwan, Sultan Alamri, Samer Atawneh, Mutasem K. Alsmadi

    Published 2023-03-01
    “…The developed file system exploits the parallelism of multi-core processors and implements a hybrid encryption method for symmetric and asymmetric ciphers. Usability is significantly enhanced by performing encryption, decryption, and key management in a manner that is fully dynamic and transparent to users. …”
    Get full text
    Article
  9. 2229

    More Inputs Makes Difference: Implementations of Linear Layers Using Gates with More Than Two Inputs by Qun Liu, Weijia Wang, Ling Sun, Yanhong Fan, Lixuan Wu, Meiqin Wang

    Published 2022-06-01
    “…We improve the previous implementations of linear layers for many block ciphers according to the area with these search algorithms. …”
    Get full text
    Article
  10. 2230

    Embedded LUKS (E-LUKS): A Hardware Solution to IoT Security by German Cano-Quiveu, Paulino Ruiz-de-clavijo-Vazquez, Manuel J. Bellido, Jorge Juan-Chico, Julian Viejo-Cortes, David Guerrero-Martos, Enrique Ostua-Aranguena

    Published 2021-12-01
    “…Both are recognized as adequate solutions for IoT devices being PRESENT incorporated in the ISO/IEC 29192-2:2019 for lightweight block ciphers. E-LUKS has been implemented in modern XC7Z020 FPGA chips, resulting in a smaller hardware footprint compared to previous LUKS hardware implementations, a footprint of about a 10% of these LUKS implementations, making E-LUKS a great alternative to provide Full Disk Encryption (FDE) alongside authentication to a wide range of IoT devices.…”
    Get full text
    Article
  11. 2231

    An Innovative Feasible Approach for Multi-Media Security Using Both Chaotic and Elliptic Curve Structures by Tanveer Qayyum, Tariq Shah, Ali Yahya Hummdi, Amer Aljaedi, Zaid Bassfar

    Published 2024-01-01
    “…The non-linearity of the proposed s-box is 107.5 and the entropy of the ciphered image of Baboon is 7.9989. The security analysis indicates that the color-encrypted image offers fast and higher protection against attacks, making it suitable for real-time applications with high security requirements.…”
    Get full text
    Article
  12. 2232

    Automatic search of Meet-in-the-Middle preimage attacks on AES-like hashing by Bao, Zhenzhen, Dong, Xiaoyang, Guo, Jian, Li, Zheng, Shi, Danping, Sun, Siwei, Wang, Xiaoyun

    Published 2022
    “…It was also shown to be a threat to hash functions built on block ciphers like AES by Sasaki in 2011. Recently, such attacks on AES hashing modes evolved from merely using the freedom of choosing the internal state to also exploiting the freedom of choosing the message state. …”
    Get full text
    Conference Paper
  13. 2233

    FIVER – Robust Verification of Countermeasures against Fault Injections by Jan Richter-Brockmann, Aein Rezaei Shahmirzadi, Pascal Sasdrich, Amir Moradi, Tim Güneysu

    Published 2021-08-01
    “…Here, we consider protected designs of the lightweight ciphers CRAFT and LED-64 as well as AES. Due to several optimization strategies, our tool is able to perform more than 90 million fault injections in a single-round CRAFT design and evaluate the security in under 50 min while the symbolic simulation approach considers all 2128 primary inputs.…”
    Get full text
    Article
  14. 2234

    Using Linearizing Sets to Solve Multivariate Quadratic Equations in Algebraic Cryptanalysis by Alexander Semenov, Kirill Antonov, Stepan Kochemazov, Artem Pavlenko

    Published 2023-01-01
    “…In the computational experiments we used the proposed methodology to construct attacks on several well-known stream ciphers. The runtime estimations of some of the attacks make it possible to implement them in reasonable time.…”
    Get full text
    Article
  15. 2235

    High-Performance Hardware Implementation of MPCitH and Picnic3 by Guoxiao Liu, Keting Jia, Puwen Wei, Lei Ju

    Published 2024-03-01
    “… Picnic is a post-quantum digital signature, the security of which relies solely on symmetric-key primitives such as block ciphers and hash functions instead of number theoretic assumptions. …”
    Get full text
    Article
  16. 2236

    Aspectos demográficos en comunidades indígenas de tres regiones de Colombia Demographic features of indigenous communities in three regions of Colombia by Marion Piñeros-Petersen, Magda Ruiz-Salguero

    Published 1998-07-01
    “…The indicators differ substantially from the national ciphers. Although the indigenous population seems to be undergoing a process of demographic transition, there are marked differences between regions, with significantly higher fertility and infant mortality rates for the Caribbean region.…”
    Get full text
    Article
  17. 2237

    Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks by Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin, Victor Mollimard

    Published 2019-06-01
    “…The Feistel construction is one of the most studied ways of building block ciphers. Several generalizations were then proposed in the literature, leading to the Generalized Feistel Network, where the round function first applies a classical Feistel operation in parallel on an even number of blocks, and then a permutation is applied to this set of blocks. …”
    Get full text
    Article
  18. 2238

    Efficient Private Circuits with Precomputation by Weijia Wang, Fanjie Ji, Juelin Zhang, Yu Yu

    Published 2023-03-01
    “…The new masking scheme is applied to leverage the masking of AES and SKINNY block ciphers on ARM Cortex M architecture. The performance results show that the new scheme contributes to a significant speed-up compared with the state-of-the-art implementations. …”
    Get full text
    Article
  19. 2239
  20. 2240