Results 1 to 10 of about 44,265 (336)

A novel H.264 SVC encryption scheme for secure bit-rate transcoding [PDF]

open access: yes, 2009
This paper presents a novel architecture for the secure delivery of encrypted H.264 SVC bitstreams. It relies on a block cipher and stream cipher used in a novel way that would allow an intermediary transcoder to truncate the bitstream to the appropriate
Bull, DR, Redmill, DW, Thomas, NM
core   +2 more sources

Summary of Topological Study of Chaotic CBC Mode of Operation [PDF]

open access: yes, 2016
International audience—In cryptography, block ciphers are the most fundamental elements in many symmetric-key encryp-tion systems. The Cipher Block Chaining, denoted CBC, presents one of the most famous mode of operation that uses a block cipher to ...
Abidi, Abdessalem   +4 more
core   +3 more sources

Survey and Benchmark of Block Ciphers for Wireless Sensor Networks [PDF]

open access: yes, 2006
Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without ...
Doumen, J.M., Hartel, P.H., Law, Y.W.
core   +3 more sources

A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]

open access: yes, 2018
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal   +2 more
core   +2 more sources

Elastic block ciphers

open access: yesProceedings of the 2nd ACM symposium on Information, computer and communications security, 2007
We introduce the concept of an elastic block cipher, which refers to stretching the supported block size of a block cipher to any length up to twice the original block size while incurring a computational workload that is proportional to the block size. We define a method for converting any existing block cipher into an elastic block cipher and mention
Cook, Debra L.   +2 more
openaire   +2 more sources

The New Block Cipher Design (Tigris Cipher) [PDF]

open access: yesInternational Journal of Computer Network and Information Security, 2015
Abstract—In the present paper we have proposed a new variant of AES cipher with high level of security and an elegant construction called TIGRIS cipher. The TIGRIS name has been derived from one of the two famous rivers in Iraq. The proposed TIGRIS cipher is a revision for the proposed Euphrates cipher which has already been published.
Omar A. Dawood   +2 more
openaire   +1 more source

Parallel Implementation of PIPO and Its Application for Format Preserving Encryption

open access: yesIEEE Access, 2022
The PIPO block cipher, a domestic lightweight block cipher, was announced at ICISC’20. In particular, the bitslicing technique is implemented in the S-Layer for the PIPO block cipher.
Hyunji Kim   +5 more
doaj   +1 more source

Cryptanalysis of a chaotic block cipher with external key and its improved version [PDF]

open access: yes, 2006
Recently, Pareek et al. proposed a symmetric key block cipher using multiple one-dimensional chaotic maps. This paper reports some new findings on the security problems of this kind of chaotic cipher: 1) a number of weak keys exists; 2) some important ...
Alvarez   +12 more
core   +2 more sources

Secure Algorithms for SAKA Protocol in the GSM Network [PDF]

open access: yes, 2017
This paper deals with the security vulnerabilities of the cryptographic algorithms A3, A8, and A5 existing in the GSM network. We review these algorithms and propose new secure algorithms named NewA3, NewA8, and NewA5 algorithms with respect to the A3 ...
Chaudhari, N.S., Saxena, N.
core   +1 more source

Enhancing Embedded Data Security By Turns Cipher Block Chaining Mode Into Stream Cipher [PDF]

open access: yesEngineering and Technology Journal, 2009
In this paper, a secure data hiding method is introduced. It increases the security of embedded data through combining between the steganography and cryptography. First, the secrete message is divided into blocks with same size according to length of key
Salah Mahdi Saleh
doaj   +1 more source

Home - About - Disclaimer - Privacy