-
281
Boolean functions with restricted input and their robustness; application to the FLIP cipher
Published 2017-09-01Get full text
Article -
282
Implementasi Algoritma Affine Cipher untuk Keamanan Data Teks
Published 2020-09-01“…One way to store data sent via email is to use cryptography. The Affine Cipher is an extension of the Caesar Cipher which multiplies the plaintext by a value and adds a shift. …”
Get full text
Article -
283
-
284
-
285
Hardware Implementation Of Rc4a Stream Cipher Algorithm
Published 2007“…The implementation is able to support variable key lengths from 8 bits up to 512 bits. Unlike other stream ciphers, the proposed implementation generates two output streams at a time, whereas others generate only one output stream. …”
Get full text
Thesis -
286
Development of DNA-based dynamic key-dependent block cipher
Published 2015“…It was confirmed that the DNAB cipher had successfully passed very demanding security analyses and justified that the DNAB cipher is a secure block-cipher. …”
Get full text
Thesis -
287
Annihilators through fault injection analysis on selected stream ciphers
Published 2019Subjects: Get full text
Thesis -
288
Hybrid algorithm (GACSA) for the cryptanalysis of a simple substitution cipher
Published 2007Conference or Workshop Item -
289
Clonal selection algorithm for the cryptanalysis of a simple substitution cipher
Published 2006“…In this paper CSA is used to cryptanalyse a simple substitution cipher, whereby the key used to encrypt the plaintext is searched. …”
Conference or Workshop Item -
290
Design and implementation of lightweight encryption algorithm using prince cipher
Published 2021“…Most of the available lightweight cryptographies are round-based designs, they are able to achieve high throughput via pipelining the round functions, however the response time is not ideal. The Prince cipher is the first lightweight block cipher developed to speed up the latency of the algorithm. …”
Get full text
Thesis -
291
A competitive study of cryptography techniques over block cipher
Published 2011“…Hence, this paper aims to describe and review the different research that has done toward text encryption and description in the block cipher. Moreover, this paper suggests a cryptography model in the block cipher.…”
Get full text
Conference or Workshop Item -
292
Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure
Published 2020-12-01Subjects: “…Circular queue, Homophonic substitution cipher, Polyalphabetic substitution cipher, Substitution cipher…”
Get full text
Article -
293
Pemecahan Sandi Kriptografi dengan Menggabungkan Metode Hill Cipher dan Metode Caesar Chipher
Published 2015-05-01Subjects: Get full text
Article -
294
-
295
-
296
-
297
-
298
The Design Trends of Keystream Generator for Stream Cipher for High Immunity Attacks
Published 2016“…Due to the latest changes in observing the external network related threats within the stream cipher, it become necessary to address these threats in order to identify the generator suitable for avoiding such threats. …”
Get full text
Book Chapter -
299
Modified the RC4 Stream Cipher Algorithm Based on Irreducible Polynomial
Published 2015-04-01Subjects: “…stream cipher…”
Get full text
Article -
300
APPLICATION OF ANT COLONY ALGORITHM FOR REALIZATION OF TRANSPOSITION CIPHERS CRYPT ANALYSIS
Published 2011-02-01“…Possibility of application of ant colony algorithms for realization of the transposition ciphers cryptanalysis is studied. Its application to the plain text results in the cryptogram received by shifting symbols of the plain text in a certain order. …”
Get full text
Article