Results 1 to 10 of about 2,395,070 (371)
Secure Image Encryption Using Chaotic, Hybrid Chaotic and Block Cipher Approach. [PDF]
Secure image transmission is one of the most challenging problems in the age of communication technology. Millions of people use and transfer images for either personal or commercial purposes over the internet.
Chaudhary N, Shahi TB, Neupane A.
europepmc +2 more sources
In this paper we present a new 128-bit block cipher called Square. The original design of Square concentrates on the resistance against differential and linear cryptanalysis. However, after the initial design a dedicated attack was mounted that forced us to augment the number of rounds.
Joan Daemen+2 more
openalex +4 more sources
Probabilistic Block Cipher [PDF]
This paper is devoted to the description of a new block cipher that will be applicable in the post-quantum era and will not need a lot of resources. The main advantages: probabilistic encryption, the cipher block chaining mode, the ability to transfer to distributed systems. All this combined with the use of PRNG, working on the Cremona transformations,
Dmitry Shishlyannikov+2 more
doaj +4 more sources
FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher. [PDF]
Security of sensitive data exchanged between devices is essential. Low-resource devices (LRDs), designed for constrained environments, are increasingly becoming ubiquitous.
Abed S, Jaffal R, Mohd BJ, Alshayeji M.
europepmc +2 more sources
COUNTER MODE DEVELOPMENT FOR BLOCK CIPHER OPERATIONS [PDF]
There are two basic types of symmetric cipher: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer. Stream ciphers operate on streams of plaintext and ciphertext one bit or
Ali M. Sagheer, Ahmed T. Suod
doaj +3 more sources
Iterative Block Ciphers from Tweakable Block Ciphers with Long Tweaks
We consider a problem of constructing a secure block cipher from a tweakable block cipher (TBC) with long tweaks. Given a TBC with n-bit blocks and Γn-bit tweaks for Γ ≥ 1, one of the constructions by Minematsu in DCC 2015 shows that a simple iteration ...
Ryota Nakamichi, Tetsu Iwata
doaj +3 more sources
Elastic block ciphers: method, security and instantiations [PDF]
We introduce the concept of an elastic block cipher which refers to stretching the supported block size of a block cipher to any length up to twice the original block size while incurring a computational workload that is proportional to the block size ...
Debra L. Cook+2 more
openalex +4 more sources
Dynamic Rounds Chaotic Block Cipher Based on Keyword Abstract Extraction [PDF]
According to the keyword abstract extraction function in the Natural Language Processing and Information Retrieval Sharing Platform (NLPIR), the design method of a dynamic rounds chaotic block cipher is presented in this paper, which takes into account ...
Juan Wang, Qun Ding
doaj +2 more sources
Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images
This paper investigates the encryption efficiency of RC6 block cipher application to digital images, providing a new mathematical measure for encryption efficiency, which we will call the encryption quality instead of visual inspection, The encryption ...
Hossam E. Ahmed+2 more
openalex +3 more sources
Loong: A Family of Involutional Lightweight Block Cipher Based on SPN Structure
In past few years, as security ciphers in the Internet of Things (IoT), the research of lightweight block cipher has attracted tremendous attention in cryptography. The SPN structure has been widely used in the design of block cipher.
Bo-Tao Liu+4 more
doaj +2 more sources