-
121
-
122
-
123
-
124
-
125
-
126
Visual execution of caesar cipher methods and its application
Published 2014“…The important things considered in this program is explanation as an introduction about the Cipher chosen before continue to next lesson. This program is divided into three sequential phase for each cipher. …”
Get full text
Undergraduates Project Papers -
127
Iris template protection based on enhanced hill cipher
Published 2016“…Template protection is a crucial requirement when designing an authentication system, where the template could be modified by attacker. Hill Cipher is a block cipher and symmetric key algorithm it has several advantages such as simplicity, high speed and high throughput can be used to protect Biometric Template. …”
Get full text
Conference or Workshop Item -
128
-
129
A Fault Attack on the Family of Enocoro Stream Ciphers
Published 2021-09-01Subjects: “…enocoro family of stream ciphers…”
Get full text
Article -
130
A New Lightweight Stream Cipher Based on Chaos
Published 2019-07-01Subjects: “…lightweight stream cipher…”
Get full text
Article -
131
Design New Block Cipher Algorithm With New Concept
Published 2010-09-01“…In this paper we design new Block cipheralgorithm with new concepts that are " encryption keys updating " where this result anew approach not used in all the known block cipher algorithms which is " The samekey, encrypts the same plaintext multiple times and produces different cipher texts ",also user does not inform anything about encryption keys, that giving the proposedalgorithm protection from the cheating of user and the secrecy of the encryption keysremain only in Key Management Center (KMC), finally, this algorithm workapproximately as one-time pad.…”
Get full text
Article -
132
Design and Hardware Implementation of a Speech Cipher System
Published 2008-03-01Subjects: “…Speech Cipher…”
Get full text
Article -
133
Generalized Feistel Structures Based on Tweakable Block Ciphers
Published 2022-12-01Subjects: Get full text
Article -
134
Ciphering systems based on the error - correcting coding techniques
Published 1999-09-01“…This paper remarks on the possibility of the ciphering algorithm use based on the standard encoding techniques from the linear error - correcting coding area. …”
Get full text
Article -
135
Evolusi Cipher Vigenere dalam Peningkatan Pengamanan Informasi
Published 2021-12-01Subjects: Get full text
Article -
136
Accelerating the Best Trail Search on AES-Like Ciphers
Published 2022-06-01“…For a more in-depth application, we leverage the acceleration to investigate the optimal DC/LC resistance that GIFT-variants, called BOGI-based ciphers, can achieve. To this end, we identify all the BOGI-based ciphers and reduce them into 41,472 representatives. …”
Get full text
Article -
137
Modified SHARK Cipher and Duffing Map-Based Cryptosystem
Published 2022-06-01“…In this research, we came up with a new way to encrypt images that used the chaos and a modified block cipher named the SHARK cipher. The new algorithm looks at the creation of random sequences as a problem that needs to be solved in the best way possible, and then it uses the Duffing chaotic map to get even better random sequences. …”
Get full text
Article -
138
-
139
Ciphered Text Hiding in an Image using RSA algorithm
Published 2019-02-01“…In this paper, a method for hiding cipher text in an image file is introduced . The proposed method is to hide the cipher text message in the frequency domain of the image. …”
Get full text
Article -
140
AVX-Based Acceleration of ARIA Block Cipher Algorithm
Published 2023-01-01“…Block cipher algorithms encrypt sensitive personal, financial, and confidential information to prevent unauthorized access. …”
Get full text
Article