Showing 141 - 160 results of 2,263 for search '"cipher"', query time: 0.11s Refine Results
  1. 141
  2. 142
  3. 143

    Fault Attacks on the Authenticated Encryption Stream Cipher MORUS by Iftekhar Salam, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong

    Published 2018-01-01
    “…This paper investigates the application of fault attacks to the authenticated encryption stream cipher algorithm MORUS. We propose fault attacks on MORUS with two different goals: one to breach the confidentiality component, and the other to breach the integrity component. …”
    Get full text
    Article
  4. 144

    Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency by Tim Beyne, Siemen Dhooghe, Amir Moradi, Aein Rezaei Shahmirzadi

    Published 2021-11-01
    “…This work introduces second-order masked implementation of LED, Midori, Skinny, and Prince ciphers which do not require fresh masks to be updated at every clock cycle. …”
    Get full text
    Article
  5. 145
  6. 146
  7. 147
  8. 148
  9. 149

    Cubicle: A family of space‐hard ciphers for IoT by Rentaro Shiba, Ravi Anand, Kazuhiko Minematsu, Takanori Isobe

    Published 2023-01-01
    “…Finally, the performance of Cubicle and other ciphers in some devices powered by ARM Cortex‐M3, ‐M4, and ‐M7 processors is evaluated. …”
    Get full text
    Article
  10. 150

    Cipher Modification Against Steganalysis Based on NIST Tests by Valery Korzhik, Nguyen Duy Cuong, Guillermo Morales-Luna

    Published 2019-04-01
    “…Part of our team proposed a new steganalytic method based on NIST tests at MMM-ACNS 2017 [1], and it was encouraged to investigate some cipher modifications to prevent such types of steganalysis. …”
    Get full text
    Article
  11. 151
  12. 152

    Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers by Avik Chakraborti, Nilanjan Datta, Mridul Nandi, Kan Yasuda

    Published 2018-05-01
    “…The trick is to use combined feedback to create a difference between the cipher text block and the rate part of the next feedback (in traditional sponge these two values are the same). …”
    Get full text
    Article
  13. 153

    Doctrine of the Ciphers Intercursions among Zeropoint-Utopia-Core by Doris Zeilinger

    Published 2021-05-01
    “…The Blochian concept of cipher is discussed in some detail with a view to possible developments in the modern philosophy of nature. …”
    Get full text
    Article
  14. 154

    VHDL Implementation of Hybrid Block Cipher Method (SRC) by Ashwaq T. Hishem, Najwa M. Hassen, Ekhlas M. Farhan

    Published 2010-02-01
    “…This paper discusses the hardware design of the hybrid block cipher methodthat combines the RC6 cipher and the Serpent cipher.The block size is 128 bits, and the key can be any length up to 256 bytes. …”
    Get full text
    Article
  15. 155
  16. 156
  17. 157

    Hardware Implementation of Artificial Neural Network for Data Ciphering by Sahar L. Kadoory, Toka A. Fatehi, Qutaiba A. Hasan

    Published 2016-10-01
    Subjects: “…Back propagation, Ciphering, Encryption, FPGA, Neural Network, VHDL…”
    Get full text
    Article
  18. 158
  19. 159

    Complete SAT based Cryptanalysis of RC5 Cipher by Artur Soboń, Mirosław Kurkowski, Sylwia Stachowiak

    Published 2020-01-01
    Subjects: “…Symmetric ciphers…”
    Get full text
    Article
  20. 160

    Modern and Lightweight Component-based Symmetric Cipher Algorithms by Samar A. Qassir, Methaq T. Gaata, Ahmed T. Sadiq

    Published 2022-12-01
    Subjects: “…Lightweight Symmetric Cipher…”
    Get full text
    Article