Results 101 to 110 of about 2,395 (159)

Toward owner governance in genomic data privacy with Governome. [PDF]

open access: yesCell Rep Methods
Zhang J   +8 more
europepmc   +1 more source

Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs. [PDF]

open access: yesSci Rep
Janakiraman S   +5 more
europepmc   +1 more source

Linear Frameworks for Block Ciphers

Designs, Codes and Cryptography, 2001
In the paper linear components in (block) cipher structures are investigated, especially with respect to their role in providing resistance against differential and linear cryptanalysis. The cipher structures studied are similar to the classical Substitution-Permutation networks, however instead of permutations more general linear transformations are ...
Daemen, Joan   +2 more
openaire   +2 more sources

Sharing Block Ciphers

2000
Threshold cryptosystems use algebraic properties such as homomorphisms in order to allow several parties to jointly evaluate a cryptographic primitive. Several cryptographic primitives, however, avoid -by definition- the use of algebraic properties, or otherwise their security is compromised; this is the case, for instance, of block ciphers, pseudo ...
Ernie Brickell   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy