Showing 121 - 140 results of 2,263 for search '"cipher"', query time: 0.10s Refine Results
  1. 121
  2. 122
  3. 123
  4. 124
  5. 125
  6. 126

    Visual execution of caesar cipher methods and its application by Nur Syafiqa, Ismail

    Published 2014
    “…The important things considered in this program is explanation as an introduction about the Cipher chosen before continue to next lesson. This program is divided into three sequential phase for each cipher. …”
    Get full text
    Undergraduates Project Papers
  7. 127

    Iris template protection based on enhanced hill cipher by Khalaf, Emad Taha, Mohammed, Muamer N., Norrozila, Sulaiman

    Published 2016
    “…Template protection is a crucial requirement when designing an authentication system, where the template could be modified by attacker. Hill Cipher is a block cipher and symmetric key algorithm it has several advantages such as simplicity, high speed and high throughput can be used to protect Biometric Template. …”
    Get full text
    Conference or Workshop Item
  8. 128
  9. 129

    A Fault Attack on the Family of Enocoro Stream Ciphers by Julian Danner, Martin Kreuzer

    Published 2021-09-01
    Subjects: “…enocoro family of stream ciphers…”
    Get full text
    Article
  10. 130

    A New Lightweight Stream Cipher Based on Chaos by Lina Ding, Chunyuan Liu, Yanpeng Zhang, Qun Ding

    Published 2019-07-01
    Subjects: “…lightweight stream cipher…”
    Get full text
    Article
  11. 131

    Design New Block Cipher Algorithm With New Concept by Saad K. Majeed, Maki Mahdi Abdulhasan

    Published 2010-09-01
    “…In this paper we design new Block cipheralgorithm with new concepts that are " encryption keys updating " where this result anew approach not used in all the known block cipher algorithms which is " The samekey, encrypts the same plaintext multiple times and produces different cipher texts ",also user does not inform anything about encryption keys, that giving the proposedalgorithm protection from the cheating of user and the secrecy of the encryption keysremain only in Key Management Center (KMC), finally, this algorithm workapproximately as one-time pad.…”
    Get full text
    Article
  12. 132
  13. 133
  14. 134

    Ciphering systems based on the error - correcting coding techniques by Mária Franeková, Peter Nagy

    Published 1999-09-01
    “…This paper remarks on the possibility of the ciphering algorithm use based on the standard encoding techniques from the linear error - correcting coding area. …”
    Get full text
    Article
  15. 135
  16. 136

    Accelerating the Best Trail Search on AES-Like Ciphers by Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong

    Published 2022-06-01
    “…For a more in-depth application, we leverage the acceleration to investigate the optimal DC/LC resistance that GIFT-variants, called BOGI-based ciphers, can achieve. To this end, we identify all the BOGI-based ciphers and reduce them into 41,472 representatives. …”
    Get full text
    Article
  17. 137

    Modified SHARK Cipher and Duffing Map-Based Cryptosystem by Osama Rabie, Jawad Ahmad, Daniyal Alghazzawi

    Published 2022-06-01
    “…In this research, we came up with a new way to encrypt images that used the chaos and a modified block cipher named the SHARK cipher. The new algorithm looks at the creation of random sequences as a problem that needs to be solved in the best way possible, and then it uses the Duffing chaotic map to get even better random sequences. …”
    Get full text
    Article
  18. 138
  19. 139

    Ciphered Text Hiding in an Image using RSA algorithm by عامر عبد اللهيبي

    Published 2019-02-01
    “…In this paper, a method for hiding cipher text in an image file is introduced . The proposed method is to hide the cipher text message in the frequency domain of the image. …”
    Get full text
    Article
  20. 140

    AVX-Based Acceleration of ARIA Block Cipher Algorithm by Tae-Hee Yoo, Jussi Kivilinna, Choong-Hee Cho

    Published 2023-01-01
    “…Block cipher algorithms encrypt sensitive personal, financial, and confidential information to prevent unauthorized access. …”
    Get full text
    Article