Results 11 to 20 of about 44,265 (336)

Probabilistic Block Cipher [PDF]

open access: yesAnnals of computer science and information systems, 2018
This paper is devoted to the description of a new block cipher that will be applicable in the post-quantum era and will not need a lot of resources. The main advantages: probabilistic encryption, the cipher block chaining mode, the ability to transfer to distributed systems. All this combined with the use of PRNG, working on the Cremona transformations,
Dmitry Shishlyannikov   +2 more
doaj   +3 more sources

KOMBINASI CAESAR CIPHER DAN REVERSE CIPHER BERDASARKAN CIPHER BLOCK CHAINING

open access: yesMajalah Ilmiah Matematika dan Statistika, 2021
Communication in the current era of globalization is very developed. Many applications that can be used to facilitate communication. However, because of this convenience, the security of the information contained in it will be more easily hacked by ...
Maulidyah Lailatun Najah   +1 more
doaj   +2 more sources

Dynamic Rounds Chaotic Block Cipher Based on Keyword Abstract Extraction [PDF]

open access: yesEntropy, 2018
According to the keyword abstract extraction function in the Natural Language Processing and Information Retrieval Sharing Platform (NLPIR), the design method of a dynamic rounds chaotic block cipher is presented in this paper, which takes into account ...
Juan Wang, Qun Ding
doaj   +2 more sources

Iterative Block Ciphers from Tweakable Block Ciphers with Long Tweaks

open access: yesIACR Transactions on Symmetric Cryptology, 2020
We consider a problem of constructing a secure block cipher from a tweakable block cipher (TBC) with long tweaks. Given a TBC with n-bit blocks and Γn-bit tweaks for Γ ≥ 1, one of the constructions by Minematsu in DCC 2015 shows that a simple iteration ...
Ryota Nakamichi, Tetsu Iwata
doaj   +3 more sources

Block Cipher Analysis [PDF]

open access: yes, 2009
Blockchifre er kryptografiske primitiver som opererer på tekster af en, af chifferet, specificeret længde. De fleste blockchifre er designet med sikkerhed og effektivitet for øje. Blokchifre anvendes i vid udstrækning til kryptering men indgår eksempelvis også som byggesten i visse hashfunktioner og i såkaldte message authentication codes (MAC ...
Miolane, Charlotte Vikkelsø
core   +2 more sources

Survey of Lightweight Block Cipher [PDF]

open access: yesJisuanji kexue, 2023
With the rapid development of information technology,human beings are entering the era of ubiquitous connectivity,where billions of Internet of Things(IoT) devices are connected to the network.The continuous growth of network attacks targeting user ...
ZHONG Yue, GU Jieming, CAO Honglin
doaj   +1 more source

New mode of operation inspired by the braid of long hair [PDF]

open access: yesRevista Română de Informatică și Automatică, 2023
In cryptography, a mode of operation is the way of processing plaintext and encrypted text blocks within a block cipher algorithm, or it is the presentation of a method of chaining blocks in a block cipher.
Hana ALI-PACHA   +2 more
doaj   +1 more source

Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2023
We consider the design of a tweakable block cipher from a block cipher whose inputs and outputs are of size n bits. The main goal is to achieve 2n security with a large tweak (i.e., more than n bits). Previously, Mennink at FSE’15 and Wang et al.
Yaobin Shen, François-Xavier Standaert
doaj   +1 more source

Lightweight Block Cipher Security Evaluation Based on Machine Learning Classifiers and Active S-Boxes

open access: yesIEEE Access, 2021
Machine learning has recently started to gain the attention of cryptographic researchers, notably in block cipher cryptanalysis. Most of these machine learning-based approaches are black box attacks that are cipher-specific.
Ting Rong Lee   +4 more
doaj   +1 more source

Time-based One-Time Password Scheme for PLC [PDF]

open access: yesJisuanji gongcheng, 2021
To solve the problem that existing Time-based One-Time Password(TOTP) schemes cannot run efficiently on Programmable Logic Controller(PLC), a TOTP scheme called BC-TOTP is proposed based on block cipher.
BAO Zhiting, KE Junming, YANG Zheng, LONG Hua, HUANG Dong
doaj   +1 more source

Home - About - Disclaimer - Privacy