Showing 261 - 280 results of 2,263 for search '"cipher"', query time: 0.16s Refine Results
  1. 261
  2. 262

    Image Encryption Using Block Cipher Based Serpent Algorithm by Yossra Hussain Ali, Haider Aabdali Ressan

    Published 2016-02-01
    “…In an encryption scheme, the message or information, referred to as plaintext, is encrypted using an encryption algorithm, generating cipher textthat can only be read if decrypted.A proposal algorithm forimages protectionis depending on the block cipher serpent algorithm infeistel network structure, because numbers of round and linear transformation function and used block size of 512 bits rather than 128 bitshas more complexity for attacker or unauthorized person to discover original images.In modified serpent, the correlation coefficient decreases to below the traditional serpent algorithm. …”
    Get full text
    Article
  3. 263
  4. 264
  5. 265

    Cryptobiometrics for the Generation of Cancellable Symmetric and Asymmetric Ciphers with Perfect Secrecy by Vicente Jara-Vera, Carmen Sánchez-Ávila

    Published 2020-09-01
    “…This system uses perfect substitution and transposition encryption, showing that there exist two systems with these features, not just one (i.e., the Vernam substitution cipher). We offer a practical application using voice biometrics by means of the Welch periodogram, in which we achieved the remarkable result of an equal error rate of (0.0631, 0.9361). …”
    Get full text
    Article
  6. 266

    Ciphering the Unnamable through the Letter: Horror in the Poetry of Paul Celan by David Jiménez Arenas

    Published 2014-10-01
    “…The conclusion is that<br />silence arises due to the impossibility<br />of ciphering horror by resorting<br />to the letter.</p>…”
    Get full text
    Article
  7. 267
  8. 268
  9. 269

    Implementasi Enkripsi Dekripsi Algoritma Affine Cipher Berbasis Android by Sasono Wibowo

    Published 2018-07-01
    “…Algoritma affine cipher merupakan perkembangan dari algoritma caesar dimana algoritma affine cipher menggunakan dua kunci. …”
    Get full text
    Article
  10. 270

    Lightweight Block Ciphers for IoT: Energy Optimization and Survivability Techniques by Bassam J. Mohd, Thaier Hayajneh

    Published 2018-01-01
    “…The objective of this paper is to explore opportunities to improve performance and optimize energy consumption for cipher designs targeted for low-resource IoT devices. …”
    Get full text
    Article
  11. 271

    Improved rotational‐XOR cryptanalysis of Simon‐like block ciphers by Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, Chao Li

    Published 2022-07-01
    “…Abstract Rotational‐XOR (RX) cryptanalysis is a cryptanalytic method aimed at finding distinguishable statistical properties in Addition‐Rotation‐XOR‐C ciphers, that is, ciphers that can be described only by using modular addition, cyclic rotation, XOR and the injection of constants. …”
    Get full text
    Article
  12. 272

    Evaluating the Performance of Lightweight Ciphers in Constrained Environments—The Case of Saturnin by Panagiotis Podimatas, Konstantinos Limniotis

    Published 2022-02-01
    “…In this paper, the performance of lightweight block ciphers in such highly constrained environments is studied. …”
    Get full text
    Article
  13. 273

    SAT-aided Automatic Search of Boomerang Distinguishers for ARX Ciphers by Dachao Wang, Baocang Wang, Siwei Sun

    Published 2023-03-01
    “… In Addition-Rotation-Xor (ARX) ciphers, the large domain size obstructs the application of the boomerang connectivity table. …”
    Get full text
    Article
  14. 274
  15. 275
  16. 276
  17. 277
  18. 278
  19. 279

    Block cipher four implementation on field programmable gate array by Yusuf Kurniawan, Muhammad Adli Rizqulloh

    Published 2020-12-01
    “…One of many block cipher algorithms developed by Indonesian researchers is the BCF (Block Cipher-Four) - a block cipher with 128-bit input/output that can accept 128-bit, 192-bit, or 256-bit keys. …”
    Get full text
    Article
  20. 280