Showing 101 - 120 results of 2,263 for search '"cipher"', query time: 0.11s Refine Results
  1. 101

    Counter Mode Development for Block Cipher Operations by Ali Sagheer

    Published 2009-03-01
    Subjects: “…block cipher…”
    Get full text
    Article
  2. 102

    A SUGGESTED SUPER SALSA STREAM CIPHER by Mohammed Salih Mahdi, Nidaa Flaih Hassan

    Published 2018-12-01
    Subjects: “…Stream cipher…”
    Get full text
    Article
  3. 103
  4. 104

    Kangaroo A Proposed Stream Cipher Algorithm by Abdul-Monem S. Rahma, Suhad AbdulZahra Hassan Al-Quraishi

    Published 2010-01-01
    Subjects: “…additive stream cipher…”
    Get full text
    Article
  5. 105
  6. 106
  7. 107
  8. 108
  9. 109

    TNT : how to tweak a block cipher by Bao, Zhenzhen, Guo, Chun, Guo, Jian, Song, Ling

    Published 2020
    “…In this paper, we propose Tweak-aNd-Tweak (𝖳𝖭𝖳 for short) mode, which builds a tweakable block cipher from three independent block ciphers. 𝖳𝖭𝖳 handles the tweak input by simply XOR-ing the unmodified tweak into the internal state of block ciphers twice. …”
    Get full text
    Conference Paper
  10. 110
  11. 111
  12. 112

    Analysis and Improvements of the Full Spritz Stream Cipher by Banik, Subhadeep, Isobe, Takanori, Morii, Masakatu

    Published 2017
    “…Spritz is a stream cipher proposed by Rivest and Schuldt at the rump session of CRYPTO 2014. …”
    Get full text
    Get full text
    Journal Article
  13. 113

    Key-dependent s-box in lightweight block ciphers by AlDabbagh, S.S.M., Taha Alshaikhli, Imad Fakhri, Zaba, Muhammad Reza

    Published 2014
    “…This paper introduces new methods of how to generate a suitable key-dependent substitution boxes (Sboxes) for use in lightweight block ciphers. An S-box is commonly used in block ciphers to provide the crucial property of nonlinearity. …”
    Get full text
    Get full text
    Article
  14. 114
  15. 115

    A framework for describing block cipher cryptanalysis by Phan, Raphael C. W., Siddiqi, Mohammad Umar

    Published 2006
    “…Block ciphers provide confidentiality by encrypting confidential messages into unintelligible form, which are irreversible without knowledge of the secret key used. …”
    Get full text
    Article
  16. 116
  17. 117

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…The development of block ciphers have resulted in a number of cryptographic algorithms such as, AES, ARIA, BLOWFISH256, DESL, 3D-AES and many more. …”
    Get full text
    Thesis
  18. 118

    A new 128-bit block cipher by Mohd Ali, Fakariah Hani

    Published 2009
    “…Even though there have been so much development of the block cipher, the industry still requires another block cipher as long as security features are met. …”
    Get full text
    Thesis
  19. 119

    The Construction Of Quantum Block Cipher For Grover Algorithm by Eid, Almazrooie Mishal

    Published 2018
    “…Similarly to classical computing, to conduct a quantum attack on a classical block cipher, the block cipher must be designed and implemented as a quantum reversible circuit in a quantum platform.…”
    Get full text
    Thesis
  20. 120