Results 281 to 290 of about 44,265 (336)

A new multiple image encryption algorithm using hyperchaotic systems, SVD, and modified RC5. [PDF]

open access: yesSci Rep
Alexan W   +6 more
europepmc   +1 more source

Secure gray image sharing framework with adaptive key generation using image digest. [PDF]

open access: yesSci Rep
Nithya C   +7 more
europepmc   +1 more source

Linear Frameworks for Block Ciphers

Designs, Codes and Cryptography, 2001
In the paper linear components in (block) cipher structures are investigated, especially with respect to their role in providing resistance against differential and linear cryptanalysis. The cipher structures studied are similar to the classical Substitution-Permutation networks, however instead of permutations more general linear transformations are ...
Daemen, Joan   +2 more
openaire   +2 more sources

Sharing Block Ciphers

2000
Threshold cryptosystems use algebraic properties such as homomorphisms in order to allow several parties to jointly evaluate a cryptographic primitive. Several cryptographic primitives, however, avoid -by definition- the use of algebraic properties, or otherwise their security is compromised; this is the case, for instance, of block ciphers, pseudo ...
Ernie Brickell   +2 more
openaire   +1 more source

Cipher Block Parallel Mode

2020 IEEE-HYDCON, 2020
Most of the current symmetric cryptographic algorithms are deterministic algorithms, i.e., for a given plain text and key mix, the encryption dependably results in the same cipher-text. The attacker can misuse this deterministic nature of symmetric block encryption algorithms by carrying cryptanalysis.
V Valli Kumari   +2 more
openaire   +1 more source

Related Block Ciphers

2002
We did not design Rijndael from scratch. In fact, prior to the design of Rijndael, we had already published three block ciphers that are similar to Rijndael. Each of these ciphers inherits properties from its predecessor and enriches them with new ideas.
Joan Daemen, Vincent Rijmen
openaire   +1 more source

Using Block Ciphers

2011
A block cipher on its own is rather limited.It takes a b-bit string and outputs a b-bit string under the action of a secret key. But what happens when the message we wish to encrypt is 37 bits long and is too small to fill an entire block? What happens if the message is too long for a single block?
Lars R. Knudsen, Matthew J. B. Robshaw
openaire   +1 more source

Home - About - Disclaimer - Privacy