Results 21 to 30 of about 2,386,676 (394)
Machine learning has recently started to gain the attention of cryptographic researchers, notably in block cipher cryptanalysis. Most of these machine learning-based approaches are black box attacks that are cipher-specific.
Ting Rong Lee+4 more
doaj +1 more source
Proposal of New Block Cipher Algorithm [PDF]
Speed and complexity are two important properties in the block cipher.The block length of the block cipher controls these two aspects. The speedlimitation enforces the designer to build block cipher system as hardwareprototype.
Hilal Hadi Salih+2 more
doaj +1 more source
A common trend in applications of block ciphers over the past decades has been to employ block ciphers as one piece of a “mode of operation”—possibly, a way to make a secure symmetric-key cryptosystem, but more generally, any cryptographic application.
Liskov, Moses+2 more
openaire +5 more sources
Matrix Power Function Based Block Cipher Operating in CBC Mode
In our previous study, we proposed a perfectly secure Shannon cipher based on the so-called matrix power function. There we also introduced a concept of single round symmetric encryption, i.e., we used the matrix power function together with some rather ...
Lina Dindiene+3 more
doaj +1 more source
Efficient Implementation of PRESENT and GIFT on Quantum Computers
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key ...
Kyungbae Jang+5 more
doaj +1 more source
We introduce SPEEDY, a family of ultra low-latency block ciphers. We mix engineering expertise into each step of the cipher’s design process in order to create a secure encryption primitive with an extremely low latency in CMOS hardware.
G. Leander+3 more
semanticscholar +1 more source
PENGEMBANGAN MODUL ENKRIPSI DAN DEKRIPSI PADA PHP DENGAN MODIFIKASI METODE KRIPTOGRAFI VIGENERE CIPHER DAN CIPHER BLOCK CHAINING (Studi Kasus pada geekybyte.com) [PDF]
Penggunaan fungsi hash pada pengamanan data atau informasi pada sebuah web site sudah tidak aman lagi, karena memiliki kelemahan berupa collision. Pengamanan yang dilakukan tidak tergantung pada kerahasiaan metode atau algortima yang digunakan, tetapi ...
Aribowo, Eko, Nugroho, Prade Septo
core +4 more sources
Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited
We construct non-malleable codes in the split-state model with codeword length m + 3λ or m + 5λ, where m is the message size and λ is the security parameter, depending on how conservative one is. Our scheme is very simple and involves a single call to a
Gianluca Brian+3 more
doaj +1 more source
SLIM: A Lightweight Block Cipher for Internet of Health Things
Nowadays, there is a strong demand for increasing the protection of resource-constrained devices such as Radio frequency identification (RFID) systems. Current cryptographic algorithms are sufficient for high-resource desktop computers.
Bassam Aboushosha+4 more
semanticscholar +1 more source
Parallel Implementations of ARIA on ARM Processors and Graphics Processing Unit
The ARIA block cipher algorithm is Korean standard, IETF standard (RFC 5794), and part of the TLS/SSL protocol. In this paper, we present the parallel implementation of ARIA block cipher on ARMv8 processors and GPU.
Siwoo Eum+5 more
doaj +1 more source