Showing 221 - 240 results of 2,263 for search '"cipher"', query time: 0.12s Refine Results
  1. 221
  2. 222
  3. 223

    New forgery attack on the authenticated cipher SCREAM and iSCREAM by Yu-dan TIAN, Yong-zhuang WE

    Published 2016-01-01
    “…Recently, authentica-tion encryption algorithms have received attentions extensively since the event of CAESAR cipher solicitation was developed. SCREAM had been selected as one of the second-round candidates in CAESAR competition because of its novel structure and design idea. …”
    Get full text
    Article
  4. 224
  5. 225
  6. 226
  7. 227

    Cryptanalyzing an image cipher using multiple chaos and DNA operations by Heping Wen, Yiting Lin

    Published 2023-07-01
    “…Recently, an improved color image cipher (ICIC-DNA) based on multiple deoxyribonucleic acid (DNA) sequence operations with DNA synthetic image and chaos was proposed. …”
    Get full text
    Article
  8. 228
  9. 229
  10. 230

    On the dynamic reconfigurable implementations of MISTY1 and KASUMI block ciphers. by Huang Jiexian, Yasir Khizar, Zain Anwar Ali, Raza Hasan, Muhammad Salman Pathan

    Published 2023-01-01
    “…Novel hardware architectures for dynamic reconfigurable implementation of 64-bit MISTY1 and KASUMI block ciphers are proposed to enhance the performance of cryptographic chips for secure IoT applications. …”
    Get full text
    Article
  11. 231
  12. 232
  13. 233
  14. 234

    Reconfiurable multi-launch pipeline processing architecture for block cipher by Xue Yuqian, Dai Zibin

    Published 2020-04-01
    “…With the wide application of reconfigurable design technology in the field of cryptography, the existing reconfigurable cryptography system can hardly meet the needs of high-speed communication and equipment miniaturization.Therefore, it is the goal of this paper to design a high performance reconfigurable processing architecture that can flexibly implement block cipher algorithms.Based on the reconfigurable array structure and the multi-launch mechanism, this paper proposes a reconfigurable multi-launch pipeline processing architecture to solve the problems of low throughput and low resource utilization of the reconfigurable cryptography system.This architecture is able to transmit multiple packets in parallel and pipeline processing, and has higher throughput and unit utilization, which greatly improves the algorithm performance of the reconfigurable system.Experiments show that the throughput of AES can reach 3.19 Gb/s under the operating frequency of 350 MHz.Compared with the single-launch structure, its performance improved by about 1.1 times.…”
    Get full text
    Article
  15. 235

    On the Application of Evolutionary Computation Techniques in Designing Stream Cipher Systems by Wasan Shaker Awad

    Published 2011-10-01
    Subjects: “…Genetic Programming; Simulated Annealing; Stream Ciphers; Automated System Design.…”
    Get full text
    Article
  16. 236
  17. 237
  18. 238
  19. 239

    Proposed A Permutation and Substitution Methods of Serpent Block Cipher by Intisar Abid Yousif

    Published 2019-05-01
    Subjects: “…Serpent block cipher, initial and final permutation, substitutions boxes, key generation, logistic chaos map, standard chaos map.…”
    Get full text
    Article
  20. 240

    Area-Efficient Hardware Architectures of MISTY1 Block Cipher by Yasir, N. Wu, X. Chen, M. Rehan Yahya

    Published 2018-06-01
    “…In this paper, state-of-the-art hardware implementations of MISTY1 block cipher are presented for area-constrained wireless applications. …”
    Get full text
    Article