-
321
Breaking Masked Implementations of the Clyde-Cipher by Means of Side-Channel Analysis
Published 2022-08-01Subjects: Get full text
Article -
322
Matrix Power Function Based Block Cipher Operating in CBC Mode
Published 2022-06-01“…In our previous study, we proposed a perfectly secure Shannon cipher based on the so-called matrix power function. …”
Get full text
Article -
323
Bayesian Modeling for Differential Cryptanalysis of Block Ciphers: A DES Instance
Published 2023-01-01“…Encryption algorithms based on block ciphers are among the most widely adopted solutions for providing information security. …”
Get full text
Article -
324
Pengamanan Citra Digital Berbasis Kriptografi Menggunakan Algoritma Vigenere Cipher
Published 2022-01-01Subjects: Get full text
Article -
325
Application of Extended Euclid Algorithm on Hill Cipher Cryptography Modulo 95
Published 2023-07-01Subjects: Get full text
Article -
326
Zero-correlation attacks on tweakable block ciphers with linear tweakey expansion
Published 2019Subjects: “…Tweakable Block Ciphers…”
Get full text
Get full text
Journal Article -
327
Fully automated differential fault analysis on software implementations of block ciphers
Published 2020“…While there are techniques that provide a fault analysis automation on the cipher level to some degree, it can be shown that when it comes to software implementations, there are new vulnerabilities, which cannot be found by observing the cipher design specification. …”
Get full text
Journal Article -
328
-
329
-
330
A novel enhancement technique of the hill cipher for effective cryptographic purposes.
Published 2011“…The Hill cipher is the first polygraph cipher which has a few advantages in data encryption. …”
Get full text
Article -
331
Randomness analysis on blowfish block cipher using ECB and CBC modes
Published 2013“…Randomness of the output is one of the significant factors in measuring the security of any cryptographic algorithm.Non-random block cipher is vulnerable to any type of attack.This paper presents the National Institute of Standard and Technology (NIST) statistical tests of the Blowfish algorithm to investigate its randomness.Blowfish algorithm with Electronic Codebook (ECB) and Cipher Block Chaining (CBC) modes were conducted for these tests.In addition, comparisons between them were introduced.The analysis showed that Blowfish algorithm with ECB mode was inappropriate with data such as text and image files which have large strings of identical bytes.This inconsistency is due to the majority of the 188 statistical tests of NIST statistical tests failing in all rounds.…”
Get full text
Article -
332
A Proposed Method for Achieving the Confidentiality of Arabic Texts
Published 2019-01-01Subjects: “…transposition cipher…”
Get full text
Article -
333
Cryptography and Secret Communications in Ancient World
Published 2014-05-01Subjects: Get full text
Article -
334
-
335
-
336
-
337
-
338
Biometric Template Protection based on Hill Cipher Algorithm with Two Invertible Keys
Published 2018“…The proposed encryption method provides sufficient security and protection for the biometric templates from attacks, where the experimental results showed high efficiency comparing with the traditional Hill Cipher and existing methods.…”
Get full text
Article -
339
Efficient Implementation of ARX-Based Block Ciphers on 8-Bit AVR Microcontrollers
Published 2020-10-01Subjects: “…LEA block cipher…”
Get full text
Article -
340
Scheduling algorithm for stochastic job stream cipher service based on load balancing
Published 2018-06-01“…Business stream parallel processing system face the situation of the diversity of cipher service requests,the cross of serial mode and parallel mode,the intercross of different business data flow,and the demand of high speed and high reliability in security field.In order to improve the parallel processing efficiency of multi-cryptographic algorithm,load balancing was used as scheduling objective.Based on hierarchical hardware scheduling method (HHS-ACDID),considering the processing node’s storage capacity and processing speed,a load balancing scheduling algorithm was approved to support non related tasks and related tasks at the same time,which achieves the high speed cipher processing throughput.Simulation results show that the algorithm can complete dynamic scheduling of data stream system and get better load balancing effect.Compared with HHS-ACDID,the efficiency of the algorithm is improved by about 12%.…”
Get full text
Article