Showing 1,941 - 1,960 results of 2,263 for search '"cipher"', query time: 0.15s Refine Results
  1. 1941

    Emerging non-volatile memory based physical unclonable functions by Zhang, Le

    Published 2016
    “…Hardware-based security solutions for accelerating cryptographic primitives like hash function and block cipher using hardware fabrics on FPGA and ASIC has been studied comprehensively in the literature. …”
    Get full text
    Thesis
  2. 1942

    ENKRIPSI CITRA BERBASIS CHAOS MENGGUNAKAN METODE TRANSFORMASI BERBASIS BLOK PADA TELEPON SELULER by , CATUR ISWAHYUDI, , Drs. Edi Winarko, M.Sc., Ph.D.,Â

    Published 2012
    “…Information  security  becomes  an  important  issue  in  the  storage  and  transmission of data. Modern encryption algorithms such as DES, AES, IDEA uses  a  complicated  and  complex  algorithms,  that  are  not  suitable  for  image  encryption on mobile phones. Necessary tradeoff between speed, security, and  flexibility.  Chaotic  systems  have  unpredictable,  high  sensitivity,  and  ergodicity  makes  chaosâ��based  encryption  so  as  a  candidate  of  fast  and  safe  image  encryption  scheme.  This  study  aims  to  obtain  the  image  encryption  algorithm  which is simple and safe yet, and can be applied to mobile phones with a quick  and efficient computing resources. The proposed algorithm is chaosâ��based image  encryption using blockâ��based transformation method.  The experimental results show that the histogram of cipher image has the  diversity  and  distribution  of  significant  differences  with  plain  histogram  image.  This indicates that the encryption algorithm used can not provide any clues to do  statistical  attack.  The average  value  of  entropy,  correlation,  and  the  quality  of  encryption  indicates  that  the  proposed  encryption  system  is  quite  satisfactory.  The experimental results also prove that the characteristics of the chaos that is  sensitive to initial values provide a good security from attack exhaustive attack.   Applications  successfully  implemented  on  a  mobile  phone  with  a  relatively small memory consumption and fast process. Therefore, the purpose  of  research  to  get  the  encryption  algorithm  which  is  secure,  fast,  and  efficient  computing resources can be said to be achieved.Â…”
    Thesis
  3. 1943

    Prognostic and predictive value of a five-molecule panel in resected pancreatic ductal adenocarcinoma: A multicentre study by Jun-Chao Guo, Peng Zhang, Li Zhou, Lei You, Qiao-Fei Liu, Zhi-Gang Zhang, Bei Sun, Zhi-Yong Liang, Jun Lu, Da Yuan, Ai-Di Tan, Jian Sun, Quan Liao, Meng-Hua Dai, Gary Guishan Xiao, Shao Li, Tai-Ping Zhang

    Published 2020-05-01
    “…Methods: Firstly, a novel computational strategy integrating prognostic evidence from omics and literature on the basis of bioinformatics prediction (CIPHER) to generate the network, was designed to systematically identify potential high-confidence PDAC-related prognostic candidates. …”
    Get full text
    Article
  4. 1944

    Implications for a policy of initiating antiretroviral therapy in people diagnosed with human immunodeficiency virus: the CAPRA research programme by Ada Miltz, Andrew N Phillips, Andrew Speakman, Valentina Cambiano, Alison Rodger, Fiona C Lampe

    Published 2017-10-01
    “…Setting, participants and interventions: The series of studies used to inform the model included (1) the Antiretrovirals, Sexual Transmission Risk and Attitudes (ASTRA) study, a cross-sectional self-administered questionnaire study of people diagnosed with HIV attending eight HIV outpatient clinics in the UK (2011–12); (2) the Cognitive Impairment in People with HIV in the European Region (CIPHER) study, a study of levels of neurocognitive impairment in HIV-positive ASTRA participants and people from HIV clinics in Rome, Copenhagen and Minsk; (3) the Attitudes to, and Understanding of, Risk of Acquisition of HIV (AURAH) study, a cross-sectional self-administered questionnaire study of individuals who have not been diagnosed as HIV-positive attending 20 genitourinary medicine clinics across the UK (2013–14); (4) a substudy of sexual behaviour among individuals enrolled in an open-label multicentre international randomised trial (from 2013) of immediate versus deferred ART (to CD4 cell counts of 350/µl) in people with CD4 cell counts of > 500/µl [the Strategic Timing of Antiretroviral Therapy (START) trial]; and (5) Partners of People on ART: a new Evaluation of the Risks (PARTNER), an observational multicentre longitudinal study of HIV serodifferent heterosexual and MSM couples, in which the HIV-positive partner is on ART (2010–14). …”
    Get full text
    Article
  5. 1945
  6. 1946

    A Lightweight Image Cryptosystem for Cloud-Assisted Internet of Things by Esau Taiwo Oladipupo, Oluwakemi Christiana Abikoye, Joseph Bamidele Awotunde

    Published 2024-03-01
    “…An intermediate image, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>i</mi><mi>n</mi><mi>t</mi><mi>i</mi><mi>m</mi><mi>a</mi><mi>g</mi><mi>e</mi><mo>=</mo><mi>R</mi><mi>i</mi><mi>m</mi><mo>⨂</mo><mi>P</mi></mrow></semantics></math></inline-formula>, and cipher image, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>C</mi><mo>=</mo><mi>E</mi><mi>n</mi><mi>c</mi><mfenced separators="|"><mrow><mi>i</mi><mi>n</mi><mi>t</mi><mi>i</mi><mi>m</mi><mi>a</mi><mi>g</mi><mi>e</mi><mo>,</mo><mi>K</mi></mrow></mfenced><mo>,</mo></mrow></semantics></math></inline-formula> were obtained. …”
    Get full text
    Article
  7. 1947

    Algoritmi selektivnog šifrovanja - pregled sa ocenom performansi / Selective encryption algorithms: Overview with performance evaluation by Boriša Ž. Jovanović

    Published 2010-10-01
    “…Then, the compressed bitstream is entirely encrypted using a standard cipher (DES - Data Encryption Algorithm, IDEA - International Data Encryption Algorithm, AES - Advanced Encryption Algorithm etc.). …”
    Get full text
    Article
  8. 1948
  9. 1949
  10. 1950

    Simon V of Montfort: The exercise and aims of independent Baronial power at home and on crusade, 1195-1218 by Lippiatt, G

    Published 2015
    “…He was more than a simple cipher for ecclesiastical priorities: his campaigns and government were ambiguous in their attitude toward mercenaries and complicit in the problem of usury. …”
    Thesis
  11. 1951

    The need for polymorphic encryption algorithms: A review paper by Altigani, Abdelrahman, Hasan, Shafaatunnur, Barry, Bazara

    Published 2020
    “…Current symmetric ciphers including the Advanced Encryption Standard (AES) are deterministic and open. …”
    Get full text
    Article
  12. 1952

    Cryptography in the Information Society / by Ryabko, Boris, author 290767, Fionov, Andrey, author 341567

    Published 2021
    “…The topics addressed include block ciphers, stream ciphers, public key encryption, digital signatures, cryptographic protocols, elliptic curve cryptography, theoretical security, blockchain and cryptocurrencies, issues concerning random numbers, and steganography. …”
    text
  13. 1953

    Diffusion analysis of EFN-MDS structure by Ibrahim, Subariah

    Published 2006
    “…In general, block ciphers consist of one top-level structural model into which the round function F is plugged into. …”
    Get full text
    Conference or Workshop Item
  14. 1954

    On a mnemonic construction of permutations by Antal Eugen, Grošek Otokar, Horak Peter

    Published 2017-03-01
    “…In the past when only “paper and pencil” ciphers were in use, a mnemonic Bellaso’s method was applied to obtain a permutation from a meaningful phrase. …”
    Get full text
    Article
  15. 1955

    Cryptology for Engineers : An Application-Oriented Mathematical Introduction / by Schmied, Robert, author 636127

    Published 2020
    “…The book covers the cryptographical functionalities of ciphering, hash generation, digital signature generation, key management and random number generation, with a clear sense of the mathematical background on the one hand and engineers' requirements on the other. …”
    text
  16. 1956

    Cryptanalysis and design of lightweight symmetric-key cryptography by Sim, Siang Meng

    Published 2018
    “…Studying the building blocks of ciphers is essential for designing cryptographic primitives. …”
    Get full text
    Thesis
  17. 1957

    Kriptanalisis Algoritma Vigenere Chiper dengan Algoritma Genetika untuk Penentuan Kata Kunci by Tsuraya Ats Tsauri, Nurochman Nurochman

    Published 2018-01-01
    “…Vigenere ciphers is one of the kriptanalisis algorithm. Brute force attack and exhaustive attack is a technique of kriptanalisis vigenere ciphers, but less optimal in result. …”
    Get full text
    Article
  18. 1958

    Diffusion analysis of EFN-MDS structure by Ibrahim, Subariah, Maarof, Mohd. Aizaini

    Published 2006
    “…In general, block ciphers consist of one top-level structural model into which the round function F is plugged into. …”
    Get full text
    Conference or Workshop Item
  19. 1959

    A Novel Method for Image Encryption Based on Chaos and Transcendental Numbers by Victor Manuel Silva Garcia, Marlon David Gonzalez Ramirez, Rolando Flores Carapia, Eduardo Vega-Alvarado, Eduardo Rodriguez Escobar

    Published 2019-01-01
    “…In this paper, a method for image encryption is proposed based on a novel approach using chaos and transcendental numbers for generating the substitution box and the ciphering keys. The Chaotic Pi Ciphering (CPC) is a robust symmetric cryptosystem of the substitution-permutation-network type, that ciphers images in ten rounds. …”
    Get full text
    Article
  20. 1960

    Evolution of Cryptographic Systems from Medieval to Early Modern Times by Simon Kroll

    Published 2016-12-01
    “…The text concludes with an observation concerning the curious discrepancy between the actual use of ciphers and the evolution of new cryptologic technologies.…”
    Get full text
    Article