Showing 2,241 - 2,260 results of 2,263 for search '"cipher"', query time: 0.13s Refine Results
  1. 2241

    Miscellany/Mélanges

    Published 2017
    “…Hayes, Sophistry and displacement: the poetics of Sade's ciphers <br/> Liliane Willens, Lafayette's emancipation experiment in French Guiana - 1786-1792 <br/> Gloria Bien, Chénier and China <br/> Jean-Michel Racault, Système de la toponymie et organisation de l'espace romanesque dans <em>Paul et Virginie</em> <br/> Jean-Michel Racault, <em>Paul et Virginie</em> et l'utopie: de la 'petite société' au mythe collectif <br/> Tanguy L'Aminot, J.…”
    Book
  2. 2242

    Elevating Network Security: A Novel S-Box Algorithm for Robust Data Encryption by Jarallah Alqahtani, Muhammad Akram, Ghassan Ahmed Ali, Nadeem Iqbal, Ali Alqahtani, Roobaea Alroobaea

    Published 2024-01-01
    “…Cryptographic algorithms, on the other hand, perform a vital role in imparting security to the sensitive information during transmission, with S-Boxes (Substitution Boxes) serving as a fundamental component of symmetric-key ciphers. This study has endeavored to engineer a novel S-Box algorithm to bolster the network security. …”
    Get full text
    Article
  3. 2243

    Secure D2D Communication for 5G IoT Network Based on Lightweight Cryptography by Byoungjin Seok, Jose Costa Sapalo Sicato, Tcydenova Erzhena, Canshou Xuan, Yi Pan, Jong Hyuk Park

    Published 2019-12-01
    “…The proposed secure D2D communication was designed based on elliptic curve cryptography (ECC) and lightweight authenticated encryption with associated data (AEAD) ciphers to cover resource-constrained IoT devices.…”
    Get full text
    Article
  4. 2244

    Towards Low-Latency Implementation of Linear Layers by Qun Liu, Weijia Wang, Yanhong Fan, Lixuan Wu, Ling Sun, Meiqin Wang

    Published 2022-03-01
    “…We apply our new search algorithm to linear layers of block ciphers and find many low-latency candidates for implementations. …”
    Get full text
    Article
  5. 2245

    I. Y. Cherkasky and his books in historical and cultural fund "Departments I-XV" of library of Kyiv University of St. Volodymyr by Miaskova Tatiana

    Published 2023-01-01
    “…Cherkaskyi available in the fund have seals, double ciphers, and author'sgift inscriptions to the All-People's Library of Ukraine, and almost all the works of thescientist were published in the printed edition of the scientific center for the study of the history of law in the territory of Ukraine, which existed in 1919-30 years within theframework of the Socioeconomic Department of the All-Ukrainian Academy of Sciencesunder the title "Proceedings of the commission for the study of the history of western Rus and Ukrainian law". …”
    Get full text
    Article
  6. 2246

    Using Adaptive Zero-Knowledge Authentication Protocol in VANET Automotive Network by Igor Anatolyevich Kalmykov, Aleksandr Anatolyevich Olenev, Natalia Igorevna Kalmykova, Daniil Vyacheslavovich Dukhovnyj

    Published 2022-12-01
    “…An advantage of this protocol is the provision of high imitation resistance without using symmetric and asymmetric ciphers. This result has been achieved by using a zero-knowledge authentication protocol. …”
    Get full text
    Article
  7. 2247

    Survey on blockchain privacy protection techniques in cryptography by Feng LIU, Jie YANG, Jiayin QI

    Published 2022-08-01
    “…In recent years, the issue of data privacy has attracted increased attention, and how to achieve effective privacy protection in blockchain is a new research hotspot.In view of the current research status and development trend of blockchain in privacy protection, the privacy protection methods of blockchain in transaction address,prophecy machine and smart contract were explained, and the privacy strategies of blockchain in the protection of basic elements were summarized.Based on high-level literature at home and abroad, two types of blockchain cryptographic protection methods and usage scenarios were analyzed, including special cryptographic primitives and post-quantum cryptography.The advantages and disadvantages of seven cryptographic techniques applicable to current blockchain privacy protection were also reviewed, including attribute-based encryption, special data signature, homomorphic encryption, secure multi-party computation, zero-knowledge proofs, and lattice ciphers.It was concluded that the privacy protection of blockchain applications cannot be achieved without cryptographic technology.Meanwhile, the blockchain privacy protection technologies were analyzed in terms of both basic element protection and cryptographic protection.It was concluded that it was difficult to effectively solve the privacy problem only from the application and contract layers of the blockchain, and various cryptographic technologies should be used to complement each other according to different needs and application scenarios.In addition, according to the current development status of blockchain privacy cryptography, the narrative was developed from blockchain basic element protection and cryptography-based protection.From the perspectives of both endogenous basic element security and exogenous cryptographic privacy security, basic element privacy protection should be studied first, followed by an in-depth analysis of cryptographic protection techniques for blockchain privacy.The strengths and weaknesses and the potential value of the privacy handling aspects of the corresponding safeguards should be measured in terms of the development of technology in conjunction with practical applications, while considering the timeliness of the technology.Finally, an outlook on the future direction of blockchain privacy protection technologies was provided, indicating the issues that need to be addressed in focus.…”
    Get full text
    Article
  8. 2248

    Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks by Zhen Li, Tao Jing, Liran Ma, Yan Huo, Jin Qian

    Published 2016-03-01
    “…However, the traditional encryption method at upper layers (such as symmetric and asymmetric ciphers) may not be suitable for CIoT networks since these networks are composed of low-profile devices. …”
    Get full text
    Article
  9. 2249

    SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography by Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Stefan Mangard, Florian Mendel, Robert Primas

    Published 2018-08-01
    “…In case of symmetric ciphers, ineffective fault attacks (IFA) exploit this aspect. …”
    Get full text
    Article
  10. 2250

    Evaluación de normalización de las revistas contenidas en el Índice del Consejo Nacional de Ciencia y Tecnología de México Assessment of journal standardization in the Index of the... by Jaime Ríos Ortega

    Published 2006-06-01
    “…Based on the last two ciphers it can be appreciated that practically half of the journals in the Index include important flaws of normalization. …”
    Get full text
    Article
  11. 2251

    Voluntary barbarians of the Maloti-Drakensberg by King, R

    Published 2015
    “…Firstly, the thesis explores how eighteenth- and nineteenth-century sociocultural taxonomies were crafted by colonists and colonial subjects alike, with ethnonyms acting as ciphers for political and economic behaviours and locational traits rather than emic identifications. …”
    Thesis
  12. 2252

    Double Image Encryption System Using a Nonlinear Joint Transform Correlator in the Fourier Domain by Ronal A. Perez, Elisabet Pérez-Cabré, Juan M. Vilardy, María S. Millán, Cesar O. Torres

    Published 2023-02-01
    “…The main features of the proposed system are its increased level of security, the obtention of a single real-valued encrypted signal that contains the ciphered information of the two primary images and, additionally, a high image quality for the two final decrypted signals. …”
    Get full text
    Article
  13. 2253

    Physical Security for Fleet Management Systems by Emad Hamadaqa, Ayoub Mars, Wael Adi

    Published 2019-12-01
    “…We propose in this paper to deploy the Secret Unknown Ciphers (SUCs) techniques introduced a decade ago as digital low-cost clone-resistant identities to be embedded in selected participating electronic Fleet Management System (FMS) units. …”
    Get full text
    Article
  14. 2254

    K-XMSS and K-SPHINCS<sup>+</sup>: Enhancing Security in Next-Generation Mobile Communication and Internet Systems with Hash Based Signatures Using Korean Cryptography Algorithms by Minjoo Sim, Siwoo Eum, Gyeongju Song, Yujin Yang, Wonwoong Kim, Hwajeong Seo

    Published 2023-08-01
    “…We showcase the reference implementation of K-XMSS and K-SPHINCS<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msup><mrow></mrow><mo>+</mo></msup></semantics></math></inline-formula> employing Lightweight Secure Hash (LSH) and two hash functions based on block ciphers (i.e., CHAM and LEA) as the internal hash function. …”
    Get full text
    Article
  15. 2255

    Morgenstern e a exatidão dos dados contábeis = Morgenstern and the accuracy of accouting data by Nelson Hein, Adriana Kroenke

    Published 2010-01-01
    “…This series is not fortuitous, unless it has its own rules, conventions and a certain amount of stability.The aggregation of these ciphers, would produce a certain measure of information, though not as commonlyimagined. …”
    Get full text
    Article
  16. 2256

    Rastros do discurso: poder e interdição na decisão de um ministro do Supremo Tribunal Federal / Remarks of the speech: power and interdiction in the decision of a minister of the... by Rafael Venancio

    Published 2019-07-01
    “…Abstract: Although it is commonly boasted that the legal discourse is governed by a norm of neutrality that prevents the manifestation of ideological positions, in the flanks of judicial decisions, where there is, on the part of the State, greater care to guarantee the fair distribution of Justice to all the jurisdictions, sometimes, ciphers of another say are presented in the statement produced by the magistrate. …”
    Get full text
    Article
  17. 2257

    An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices by Alomari, Mohammad Ahmed Mohammad

    Published 2017
    “…During the file-based experiments, the parallel XTS-AES has shown a performance speedup of 1.71 with 86% efficiency faster than its serial counterpart; with higher encryption throughput achieved in the testbed device up to 8290 KB/s and 11380 KB/s when using XTS-AES and XTS-RC6 ciphers respectively. Additionally, the developed parallel SQLite-XTS system have been successfully implemented and integrated into the mobile testbed device. …”
    Get full text
    Thesis
  18. 2258

    A Cancelable Biometric Security Framework Based on RNA Encryption and Genetic Algorithms by Fatma A. Hossam Eldein Mohamed, Walid El-Shafai, Hassan M. A. Elkamchouchi, Adel ELfahar, Abdulaziz Alarifi, Mohammed Amoon, Moustafa H. Aly, Fathi E. Abd El-Samie, Aman Singh, Ahmed Elshafee

    Published 2022-01-01
    “…The proposed framework produces entirely deformed biometric templates by ciphering the main discriminative features of the biometric traits of the authorized clients. …”
    Get full text
    Article
  19. 2259

    Efecto del consumo de diferentes dosis de café filtrado sobre los niveles plasmáticos de homocisteína y presión arterial en un grupo de voluntarios sanos Effect of consumption of d... by Gloria M Agudelo O, Mauricio Duque R, Claudia M Velásquez R, Olga L Cardona H, Myriam Posada J, Vanesa Pineda S, Juliana M Orozco C, Leonor E Suárez F, Esteban Echavarría E

    Published 2008-04-01
    “…In conclusion, different filtered coffee doses consumption didn’t show significant changes in homocysteine plasma levels, nor in systolic and diastolic arterial pressure ciphers in a group of healthy normotense subjects; in the group that did not consume coffee, homocysteine levels and blood pressure had no significant decrease in these values.…”
    Get full text
    Article
  20. 2260

    Towards the Sign Function Best Approximation for Secure Outsourced Computations and Control by Mikhail Babenko, Andrei Tchernykh, Bernardo Pulido-Gaytan, Arutyun Avetisyan, Sergio Nesmachnow, Xinheng Wang, Fabrizio Granelli

    Published 2022-06-01
    “…Processing encrypted information using homomorphic ciphers uses the sign function polynomial approximation, which is a widely studied research field with many practical results. …”
    Get full text
    Article