Results 31 to 40 of about 1,391,504 (276)

A New Design of Substitution Box with Ideal Strict Avalanche Criterion

open access: yesMalaysian journal of mathematical sciences, 2022
The use of S-boxes (substitution boxes) to provide nonlinear properties is known to be a common way to design a block cipher. These nonlinear properties are necessary to ensure the security of a block cipher.
N. F. Mohd Esa   +2 more
semanticscholar   +1 more source

Flexible and high‐throughput structures of Camellia block cipher for security of the Internet of Things

open access: yesIET Computers & Digital Techniques, 2021
The advancements in wireless communication have created exponential growth in the Internet of Things (IoT) systems. Security and privacy of the IoT systems are critical challenges in many data‐sensitive applications.
Bahram Rashidi
doaj   +1 more source

The Scope of Application of Letter Frequency Analysis in Substitution Cipher

open access: yesJournal of Physics: Conference Series, 2022
Since its inception, substitution ciphers have been a popular type of cipher, and over time, academics have studied them in an effort to discover patterns that will allow them to be broken.
Yining Pan
semanticscholar   +1 more source

Combined Invariants to Gaussian Blur and Affine Transformation

open access: yesInternational Conference on Pattern Recognition, 2021
The paper presents a new theory of combined moment invariants to Gaussian blur and spatial affine transformation. The blur kernel may be arbitrary oriented, scaled and elongated.
J. Kostková, J. Flusser, Matteo Pedone
semanticscholar   +1 more source

Generation of Highly Nonlinear and Dynamic AES Substitution-Boxes (S-Boxes) Using Chaos-Based Rotational Matrices

open access: yesIEEE Access, 2020
This work reports a novel chaos-based affine transformation generation method, which is based on rotational matrices to design strong key-based S-boxes.
Muhammad Sarmad Mahmood Malik   +6 more
semanticscholar   +1 more source

Lightweight S-Box Architecture for Secure Internet of Things

open access: yesInformation, 2018
Lightweight cryptographic solutions are required to guarantee the security of Internet of Things (IoT) pervasiveness. Cryptographic primitives mandate a non-linear operation.
A. Prathiba, V. S. Kanchana Bhaaskaran
doaj   +1 more source

Consequences of Pure Point Diffraction Spectra for Multiset Substitution Systems [PDF]

open access: yes, 2009
There is a growing body of results in the theory of discrete point sets and tiling systems giving conditions under which such systems are pure point diffractive.
Lee, Jeong-Yup   +2 more
core   +1 more source

Evolutionary models for insertions and deletions in a probabilistic modeling framework

open access: yesBMC Bioinformatics, 2005
Background Probabilistic models for sequence comparison (such as hidden Markov models and pair hidden Markov models for proteins and mRNAs, or their context-free grammar counterparts for structural RNAs) often assume a fixed degree of divergence. Ideally
Rivas Elena
doaj   +1 more source

The principle of equivalence and projective structure in space-times [PDF]

open access: yes, 2007
This paper discusses the extent to which one can determine the space-time metric from a knowledge of a certain subset of the (unparametrised) geodesics of its Levi-Civita connection, that is, from the experimental evidence of the equivalence principle ...
Bel L   +14 more
core   +2 more sources

Home - About - Disclaimer - Privacy