-
1941
Emerging non-volatile memory based physical unclonable functions
Published 2016“…Hardware-based security solutions for accelerating cryptographic primitives like hash function and block cipher using hardware fabrics on FPGA and ASIC has been studied comprehensively in the literature. …”
Get full text
Thesis -
1942
ENKRIPSI CITRA BERBASIS CHAOS MENGGUNAKAN METODE TRANSFORMASI BERBASIS BLOK PADA TELEPON SELULER
Published 2012“…Information security becomes an important issue in the storage and transmission of data. Modern encryption algorithms such as DES, AES, IDEA uses a complicated and complex algorithms, that are not suitable for image encryption on mobile phones. Necessary tradeoff between speed, security, and flexibility. Chaotic systems have unpredictable, high sensitivity, and ergodicity makes chaosâ��based encryption so as a candidate of fast and safe image encryption scheme. This study aims to obtain the image encryption algorithm which is simple and safe yet, and can be applied to mobile phones with a quick and efficient computing resources. The proposed algorithm is chaosâ��based image encryption using blockâ��based transformation method. The experimental results show that the histogram of cipher image has the diversity and distribution of significant differences with plain histogram image. This indicates that the encryption algorithm used can not provide any clues to do statistical attack. The average value of entropy, correlation, and the quality of encryption indicates that the proposed encryption system is quite satisfactory. The experimental results also prove that the characteristics of the chaos that is sensitive to initial values provide a good security from attack exhaustive attack.  Applications successfully implemented on a mobile phone with a relatively small memory consumption and fast process. Therefore, the purpose of research to get the encryption algorithm which is secure, fast, and efficient computing resources can be said to be achieved.Â…”
Thesis -
1943
Prognostic and predictive value of a five-molecule panel in resected pancreatic ductal adenocarcinoma: A multicentre study
Published 2020-05-01“…Methods: Firstly, a novel computational strategy integrating prognostic evidence from omics and literature on the basis of bioinformatics prediction (CIPHER) to generate the network, was designed to systematically identify potential high-confidence PDAC-related prognostic candidates. …”
Get full text
Article -
1944
Implications for a policy of initiating antiretroviral therapy in people diagnosed with human immunodeficiency virus: the CAPRA research programme
Published 2017-10-01“…Setting, participants and interventions: The series of studies used to inform the model included (1) the Antiretrovirals, Sexual Transmission Risk and Attitudes (ASTRA) study, a cross-sectional self-administered questionnaire study of people diagnosed with HIV attending eight HIV outpatient clinics in the UK (2011–12); (2) the Cognitive Impairment in People with HIV in the European Region (CIPHER) study, a study of levels of neurocognitive impairment in HIV-positive ASTRA participants and people from HIV clinics in Rome, Copenhagen and Minsk; (3) the Attitudes to, and Understanding of, Risk of Acquisition of HIV (AURAH) study, a cross-sectional self-administered questionnaire study of individuals who have not been diagnosed as HIV-positive attending 20 genitourinary medicine clinics across the UK (2013–14); (4) a substudy of sexual behaviour among individuals enrolled in an open-label multicentre international randomised trial (from 2013) of immediate versus deferred ART (to CD4 cell counts of 350/µl) in people with CD4 cell counts of > 500/µl [the Strategic Timing of Antiretroviral Therapy (START) trial]; and (5) Partners of People on ART: a new Evaluation of the Risks (PARTNER), an observational multicentre longitudinal study of HIV serodifferent heterosexual and MSM couples, in which the HIV-positive partner is on ART (2010–14). …”
Get full text
Article -
1945
Proceedings of the 2nd International Conference on Emerging Technologies and Intelligent Systems: ICETIS 2022 Volume 1 /
Published 2023Get full text
software, multimedia -
1946
A Lightweight Image Cryptosystem for Cloud-Assisted Internet of Things
Published 2024-03-01“…An intermediate image, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>i</mi><mi>n</mi><mi>t</mi><mi>i</mi><mi>m</mi><mi>a</mi><mi>g</mi><mi>e</mi><mo>=</mo><mi>R</mi><mi>i</mi><mi>m</mi><mo>⨂</mo><mi>P</mi></mrow></semantics></math></inline-formula>, and cipher image, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>C</mi><mo>=</mo><mi>E</mi><mi>n</mi><mi>c</mi><mfenced separators="|"><mrow><mi>i</mi><mi>n</mi><mi>t</mi><mi>i</mi><mi>m</mi><mi>a</mi><mi>g</mi><mi>e</mi><mo>,</mo><mi>K</mi></mrow></mfenced><mo>,</mo></mrow></semantics></math></inline-formula> were obtained. …”
Get full text
Article -
1947
Algoritmi selektivnog šifrovanja - pregled sa ocenom performansi / Selective encryption algorithms: Overview with performance evaluation
Published 2010-10-01“…Then, the compressed bitstream is entirely encrypted using a standard cipher (DES - Data Encryption Algorithm, IDEA - International Data Encryption Algorithm, AES - Advanced Encryption Algorithm etc.). …”
Get full text
Article -
1948
-
1949
-
1950
Simon V of Montfort: The exercise and aims of independent Baronial power at home and on crusade, 1195-1218
Published 2015“…He was more than a simple cipher for ecclesiastical priorities: his campaigns and government were ambiguous in their attitude toward mercenaries and complicit in the problem of usury. …”
Thesis -
1951
The need for polymorphic encryption algorithms: A review paper
Published 2020“…Current symmetric ciphers including the Advanced Encryption Standard (AES) are deterministic and open. …”
Get full text
Article -
1952
Cryptography in the Information Society /
Published 2021“…The topics addressed include block ciphers, stream ciphers, public key encryption, digital signatures, cryptographic protocols, elliptic curve cryptography, theoretical security, blockchain and cryptocurrencies, issues concerning random numbers, and steganography. …”
text -
1953
Diffusion analysis of EFN-MDS structure
Published 2006“…In general, block ciphers consist of one top-level structural model into which the round function F is plugged into. …”
Get full text
Conference or Workshop Item -
1954
On a mnemonic construction of permutations
Published 2017-03-01“…In the past when only “paper and pencil” ciphers were in use, a mnemonic Bellaso’s method was applied to obtain a permutation from a meaningful phrase. …”
Get full text
Article -
1955
Cryptology for Engineers : An Application-Oriented Mathematical Introduction /
Published 2020“…The book covers the cryptographical functionalities of ciphering, hash generation, digital signature generation, key management and random number generation, with a clear sense of the mathematical background on the one hand and engineers' requirements on the other. …”
text -
1956
Cryptanalysis and design of lightweight symmetric-key cryptography
Published 2018“…Studying the building blocks of ciphers is essential for designing cryptographic primitives. …”
Get full text
Thesis -
1957
Kriptanalisis Algoritma Vigenere Chiper dengan Algoritma Genetika untuk Penentuan Kata Kunci
Published 2018-01-01“…Vigenere ciphers is one of the kriptanalisis algorithm. Brute force attack and exhaustive attack is a technique of kriptanalisis vigenere ciphers, but less optimal in result. …”
Get full text
Article -
1958
Diffusion analysis of EFN-MDS structure
Published 2006“…In general, block ciphers consist of one top-level structural model into which the round function F is plugged into. …”
Get full text
Conference or Workshop Item -
1959
A Novel Method for Image Encryption Based on Chaos and Transcendental Numbers
Published 2019-01-01“…In this paper, a method for image encryption is proposed based on a novel approach using chaos and transcendental numbers for generating the substitution box and the ciphering keys. The Chaotic Pi Ciphering (CPC) is a robust symmetric cryptosystem of the substitution-permutation-network type, that ciphers images in ten rounds. …”
Get full text
Article -
1960
Evolution of Cryptographic Systems from Medieval to Early Modern Times
Published 2016-12-01“…The text concludes with an observation concerning the curious discrepancy between the actual use of ciphers and the evolution of new cryptologic technologies.…”
Get full text
Article