-
261
Analysis of Works on Knapsack-based Cipher Systems Resistance to Analysis
Published 2013-02-01Subjects: “…knapsack-based cipher systems…”
Get full text
Article -
262
Image Encryption Using Block Cipher Based Serpent Algorithm
Published 2016-02-01“…In an encryption scheme, the message or information, referred to as plaintext, is encrypted using an encryption algorithm, generating cipher textthat can only be read if decrypted.A proposal algorithm forimages protectionis depending on the block cipher serpent algorithm infeistel network structure, because numbers of round and linear transformation function and used block size of 512 bits rather than 128 bitshas more complexity for attacker or unauthorized person to discover original images.In modified serpent, the correlation coefficient decreases to below the traditional serpent algorithm. …”
Get full text
Article -
263
Construction of nonlinear component of block cipher using coset graph
Published 2023-07-01Subjects: Get full text
Article -
264
Efficient MILP Modelings for Sboxes and Linear Layers of SPN ciphers
Published 2020-09-01Get full text
Article -
265
Cryptobiometrics for the Generation of Cancellable Symmetric and Asymmetric Ciphers with Perfect Secrecy
Published 2020-09-01“…This system uses perfect substitution and transposition encryption, showing that there exist two systems with these features, not just one (i.e., the Vernam substitution cipher). We offer a practical application using voice biometrics by means of the Welch periodogram, in which we achieved the remarkable result of an equal error rate of (0.0631, 0.9361). …”
Get full text
Article -
266
Ciphering the Unnamable through the Letter: Horror in the Poetry of Paul Celan
Published 2014-10-01“…The conclusion is that<br />silence arises due to the impossibility<br />of ciphering horror by resorting<br />to the letter.</p>…”
Get full text
Article -
267
Asymmetric cipher protocol using conjugacy and discrete logarithm problem
Published 2009-12-01Subjects: “…asymmetric cipher…”
Get full text
Article -
268
On the Fitness Functions Involved in Genetic Algorithms and the Cryptanalysis of Block Ciphers
Published 2023-01-01Subjects: Get full text
Article -
269
Implementasi Enkripsi Dekripsi Algoritma Affine Cipher Berbasis Android
Published 2018-07-01“…Algoritma affine cipher merupakan perkembangan dari algoritma caesar dimana algoritma affine cipher menggunakan dua kunci. …”
Get full text
Article -
270
Lightweight Block Ciphers for IoT: Energy Optimization and Survivability Techniques
Published 2018-01-01“…The objective of this paper is to explore opportunities to improve performance and optimize energy consumption for cipher designs targeted for low-resource IoT devices. …”
Get full text
Article -
271
Improved rotational‐XOR cryptanalysis of Simon‐like block ciphers
Published 2022-07-01“…Abstract Rotational‐XOR (RX) cryptanalysis is a cryptanalytic method aimed at finding distinguishable statistical properties in Addition‐Rotation‐XOR‐C ciphers, that is, ciphers that can be described only by using modular addition, cyclic rotation, XOR and the injection of constants. …”
Get full text
Article -
272
Evaluating the Performance of Lightweight Ciphers in Constrained Environments—The Case of Saturnin
Published 2022-02-01“…In this paper, the performance of lightweight block ciphers in such highly constrained environments is studied. …”
Get full text
Article -
273
SAT-aided Automatic Search of Boomerang Distinguishers for ARX Ciphers
Published 2023-03-01“… In Addition-Rotation-Xor (ARX) ciphers, the large domain size obstructs the application of the boomerang connectivity table. …”
Get full text
Article -
274
A chaos-based probabilistic block cipher for image encryption
Published 2022-01-01Subjects: Get full text
Article -
275
-
276
Efficient Parallel Implementations of PIPO Block Cipher on CPU and GPU
Published 2022-01-01Subjects: Get full text
Article -
277
Conditional differential analysis on the KATAN ciphers based on deep learning
Published 2023-05-01Subjects: “…block cipher…”
Get full text
Article -
278
Deep-Learning-Based Cryptanalysis of Lightweight Block Ciphers Revisited
Published 2023-06-01Subjects: Get full text
Article -
279
Block cipher four implementation on field programmable gate array
Published 2020-12-01“…One of many block cipher algorithms developed by Indonesian researchers is the BCF (Block Cipher-Four) - a block cipher with 128-bit input/output that can accept 128-bit, 192-bit, or 256-bit keys. …”
Get full text
Article -
280
Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers
Published 2019-11-01Subjects: Get full text
Article