Results 21 to 30 of about 44,002 (291)

New Constructions of MACs from (Tweakable) Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2017
We propose new constructions of Message Authentication Codes (MACs) from tweakable or conventional block ciphers. Our new schemes are either stateless and deterministic, nonce-based, or randomized, and provably secure either in the standard model for ...
Benoît Cogliati   +2 more
doaj   +1 more source

Counter Mode Development for Block Cipher Operations [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2009
There are two basic types of symmetric algorithms: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer.
Ali Sagheer
doaj   +1 more source

On Elastic Block Ciphers and Their Differential and Linear Cryptanalyses [PDF]

open access: yes, 2005
Motivated by applications such as databases with nonuniform field lengths, we introduce the concept of an elastic block cipher, a new approach to variable length block ciphers which incorporates fixed sized cipher components into a new network structure.
Cook, Debra L.   +2 more
core   +2 more sources

Quantitative Evaluation of Chaotic CBC Mode of Operation [PDF]

open access: yes, 2016
The cipher block chaining (CBC) block cipher mode of operation presents a very popular way of encrypting which is used in various applications. In previous research work, we have mathematically proven that, under some conditions, this mode of operation ...
Abidi, Abdessalem   +4 more
core   +3 more sources

On the Design of Secure and Fast Double Block Length Hash Functions [PDF]

open access: yes, 2008
In this work the security of the rate-1 double block length hash functions, which based on a block cipher with a block length of n-bit and a key length of 2n-bit, is reconsidered.
Chen, Kefei, Gong, Z., Lai, X.J.
core   +11 more sources

High-Speed Fault Attack Resistant Implementation of PIPO Block Cipher on ARM Cortex-A

open access: yesIEEE Access, 2021
In ICISC’20 conference, PIPO (Plug-In and Plug-Out) was proposed as an efficient block cipher for secure communication in IoT (Internet of Things) environment.
Jingyo Song   +2 more
doaj   +1 more source

An Enhancement Method Based on Modifying CFB Mode for Key Generation in AES Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2016
There are two very important characteristics in the block cipher, the amount of time for encryption process and key complexity which caused increasing the complexity of encryption process.
Hasanen S. Abdulah   +2 more
doaj   +1 more source

A novel H.264 SVC encryption scheme for secure bit-rate transcoding [PDF]

open access: yes, 2009
This paper presents a novel architecture for the secure delivery of encrypted H.264 SVC bitstreams. It relies on a block cipher and stream cipher used in a novel way that would allow an intermediary transcoder to truncate the bitstream to the appropriate
Bull, DR, Redmill, DW, Thomas, NM
core   +2 more sources

Survey and Benchmark of Block Ciphers for Wireless Sensor Networks [PDF]

open access: yes, 2006
Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without ...
Doumen, J.M., Hartel, P.H., Law, Y.W.
core   +3 more sources

Summary of Topological Study of Chaotic CBC Mode of Operation [PDF]

open access: yes, 2016
International audience—In cryptography, block ciphers are the most fundamental elements in many symmetric-key encryp-tion systems. The Cipher Block Chaining, denoted CBC, presents one of the most famous mode of operation that uses a block cipher to ...
Abidi, Abdessalem   +4 more
core   +3 more sources

Home - About - Disclaimer - Privacy