Results 21 to 30 of about 2,395 (159)

High-Speed Fault Attack Resistant Implementation of PIPO Block Cipher on ARM Cortex-A

open access: yesIEEE Access, 2021
In ICISC’20 conference, PIPO (Plug-In and Plug-Out) was proposed as an efficient block cipher for secure communication in IoT (Internet of Things) environment.
Jingyo Song   +2 more
doaj   +1 more source

An Enhancement Method Based on Modifying CFB Mode for Key Generation in AES Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2016
There are two very important characteristics in the block cipher, the amount of time for encryption process and key complexity which caused increasing the complexity of encryption process.
Hasanen S. Abdulah   +2 more
doaj   +1 more source

Elastic block ciphers

open access: yesProceedings of the 2nd ACM symposium on Information, computer and communications security, 2007
We introduce the concept of an elastic block cipher, which refers to stretching the supported block size of a block cipher to any length up to twice the original block size while incurring a computational workload that is proportional to the block size. We define a method for converting any existing block cipher into an elastic block cipher and mention
Cook, Debra L.   +2 more
openaire   +2 more sources

Parallel Implementation of PIPO and Its Application for Format Preserving Encryption

open access: yesIEEE Access, 2022
The PIPO block cipher, a domestic lightweight block cipher, was announced at ICISC’20. In particular, the bitslicing technique is implemented in the S-Layer for the PIPO block cipher.
Hyunji Kim   +5 more
doaj   +1 more source

The New Block Cipher Design (Tigris Cipher) [PDF]

open access: yesInternational Journal of Computer Network and Information Security, 2015
Abstract—In the present paper we have proposed a new variant of AES cipher with high level of security and an elegant construction called TIGRIS cipher. The TIGRIS name has been derived from one of the two famous rivers in Iraq. The proposed TIGRIS cipher is a revision for the proposed Euphrates cipher which has already been published.
Omar A. Dawood   +2 more
openaire   +1 more source

Enhancing Embedded Data Security By Turns Cipher Block Chaining Mode Into Stream Cipher [PDF]

open access: yesEngineering and Technology Journal, 2009
In this paper, a secure data hiding method is introduced. It increases the security of embedded data through combining between the steganography and cryptography. First, the secrete message is divided into blocks with same size according to length of key
Salah Mahdi Saleh
doaj   +1 more source

Counter Mode of the Shannon Block Cipher Based on MPF Defined over a Non-Commuting Group

open access: yesMathematics, 2022
In this paper, we present a counter mode of a Shannon block cipher based on the matrix power function. We make use of the matrix power function to define a single round symmetric cipher.
Aleksejus Mihalkovich   +2 more
doaj   +1 more source

BRISK: Dynamic Encryption Based Cipher for Long Term Security

open access: yesSensors, 2021
Several emerging areas like the Internet of Things, sensor networks, healthcare and distributed networks feature resource-constrained devices that share secure and privacy-preserving data to accomplish some goal.
Ashutosh Dhar Dwivedi
doaj   +1 more source

Single Key Variant of PMAC_Plus

open access: yesIACR Transactions on Symmetric Cryptology, 2017
At CRYPTO 2011, Yasuda proposed the PMAC_Plus message authentication code based on an n-bit block cipher. Its design principle inherits the well known PMAC parallel network with a low additional cost.
Nilanjan Datta   +4 more
doaj   +1 more source

Designing a Block Cipher in Galois Extension Fields for IoT Security

open access: yesIoT, 2021
This paper focuses on a block cipher adaptation of the Galois Extension Fields (GEF) combination technique for PRNGs and targets application in the Internet of Things (IoT) space, an area where the combination technique was concluded as a quality stream ...
Kiernan George, Alan J. Michaels
doaj   +1 more source

Home - About - Disclaimer - Privacy