Results 1 to 10 of about 2,386,676 (394)

New Methodology of Block Cipher Analysis Using Chaos Game [PDF]

open access: goldJournal of ICT Research and Applications, 2014
Block cipher analysis  covers randomness analysis and cryptanalysis. This paper proposes a new method potentially used for randomness analysis and cryptanalysis.
Budi Sulistyo   +3 more
doaj   +6 more sources

Secure Image Encryption Using Chaotic, Hybrid Chaotic and Block Cipher Approach. [PDF]

open access: yesJ Imaging, 2022
Secure image transmission is one of the most challenging problems in the age of communication technology. Millions of people use and transfer images for either personal or commercial purposes over the internet.
Chaudhary N, Shahi TB, Neupane A.
europepmc   +2 more sources

FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher. [PDF]

open access: yesSensors (Basel), 2019
Security of sensitive data exchanged between devices is essential. Low-resource devices (LRDs), designed for constrained environments, are increasingly becoming ubiquitous.
Abed S, Jaffal R, Mohd BJ, Alshayeji M.
europepmc   +2 more sources

The block cipher Square [PDF]

open access: bronze, 1997
In this paper we present a new 128-bit block cipher called Square. The original design of Square concentrates on the resistance against differential and linear cryptanalysis. However, after the initial design a dedicated attack was mounted that forced us to augment the number of rounds.
Daemen, J., Knudsen, L., Rijmen, Vincent
openaire   +4 more sources

COUNTER MODE DEVELOPMENT FOR BLOCK CIPHER OPERATIONS [PDF]

open access: diamondمجلة جامعة الانبار للعلوم الصرفة, 2012
There are two basic types of symmetric cipher: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer. Stream ciphers operate on streams of plaintext and ciphertext one bit or
Ali M. Sagheer, Ahmed T. Suod
doaj   +3 more sources

Iterative Block Ciphers from Tweakable Block Ciphers with Long Tweaks

open access: yesIACR Transactions on Symmetric Cryptology, 2020
We consider a problem of constructing a secure block cipher from a tweakable block cipher (TBC) with long tweaks. Given a TBC with n-bit blocks and Γn-bit tweaks for Γ ≥ 1, one of the constructions by Minematsu in DCC 2015 shows that a simple iteration ...
Ryota Nakamichi, Tetsu Iwata
doaj   +3 more sources

Dynamic Rounds Chaotic Block Cipher Based on Keyword Abstract Extraction [PDF]

open access: yesEntropy, 2018
According to the keyword abstract extraction function in the Natural Language Processing and Information Retrieval Sharing Platform (NLPIR), the design method of a dynamic rounds chaotic block cipher is presented in this paper, which takes into account ...
Juan Wang, Qun Ding
doaj   +2 more sources

Elastic Block Ciphers: Method, Security and Instantiations [PDF]

open access: green, 2009
We introduce the concept of an elastic block cipher which refers to stretching the supported block size of a block cipher to any length up to twice the original block size while incurring a computational workload that is proportional to the block size ...
Cook, Debra L.   +2 more
core   +4 more sources

Loong: A Family of Involutional Lightweight Block Cipher Based on SPN Structure

open access: yesIEEE Access, 2019
In past few years, as security ciphers in the Internet of Things (IoT), the research of lightweight block cipher has attracted tremendous attention in cryptography. The SPN structure has been widely used in the design of block cipher.
Bo-Tao Liu   +4 more
doaj   +2 more sources

Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images

open access: green, 2007
This paper investigates the encryption efficiency of RC6 block cipher application to digital images, providing a new mathematical measure for encryption efficiency, which we will call the encryption quality instead of visual inspection, The encryption ...
Ahmed, Hossam El-din Hussien   +6 more
core   +2 more sources

Home - About - Disclaimer - Privacy