Results 121 to 130 of about 84,080 (308)
Introduction: Growing application of medical information systems and various digital communication channels to transfer and share vital and medical information demonstrate the significance of medical data security and privacy policy.
Mohammadreza Naeemabadi+2 more
doaj
Cryptography Using Quasi Group and Chaotic Maps [PDF]
In this paper a symmetric key (stream cipher mode/block cipher mode) cryptosystem is proposed, involving chaotic maps and quasi group. The proposed cryptosystem destroys any existing patterns in the input, and also, it maximizes entropy.
Abughali, Heba, Mikki, Mohammad
core
SOSEMANUK: a fast software-oriented stream cipher [PDF]
Sosemanuk is a new synchronous software-oriented stream cipher, corresponding to Profile 1 of the ECRYPT call for stream cipher primitives. Its key length is variable between 128 and 256 bits. It ac- commodates a 128-bit initial value. Any key length is claimed to achieve 128-bit security.
arxiv
Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis [PDF]
Makoto Sugita+2 more
openalex +1 more source
Large multidimensional digital images of cancer tissue are becoming prolific, but many challenges exist to automatically extract relevant information from them using computational tools. We describe publicly available resources that have been developed jointly by expert and non‐expert computational biologists working together during a virtual hackathon
Sandhya Prabhakaran+16 more
wiley +1 more source
FPE scheme based on k-splits Feistel network
The construction features and discipline of Feistel network-based FPE(format-preserving encryption)schemes were analyzed.Considering on the problem that 2-splits Feistel networks-based FPE cipher’s block size was in narrow range,a type-2 Feistel network ...
Jing-wei LI+3 more
doaj +2 more sources
A note on some algebraic trapdoors for block ciphers
We provide sufficient conditions to guarantee that a translation based cipher is not vulnerable with respect to the partition-based trapdoor. This trapdoor has been introduced, recently, by Bannier et al.
Calderini, Marco
core
Imprimitive permutations groups generated by the round functions of key-alternating block ciphers and truncated differential cryptanalysis [PDF]
We answer a question of Paterson, showing that all block systems for the group generated by the round functions of a key-alternating block cipher are the translates of a linear subspace. Following up remarks of Paterson and Shamir, we exhibit a connection to truncated differential cryptanalysis. We also give a condition that guarantees that the group
arxiv
Attacks on Block Ciphers of Low Algebraic Degree [PDF]
Thomas Jakobsen, Lars R. Knudsen
openalex +1 more source
The authors conducted a retrospective study of 94 patients with advanced cancer who underwent next‐generation sequencing (NGS) gene panel analysis and received targeted treatments when applicable. Results further support evidence indicating that molecular profiling provides clinical benefit.
Michaël Dang+3 more
wiley +1 more source