Results 21 to 30 of about 2,410,295 (395)

Proposal of New Block Cipher Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2010
Speed and complexity are two important properties in the block cipher.The block length of the block cipher controls these two aspects. The speedlimitation enforces the designer to build block cipher system as hardwareprototype.
Hilal Hadi Salih   +2 more
doaj   +1 more source

Tweakable Block Ciphers [PDF]

open access: yesJournal of Cryptology, 2002
A common trend in applications of block ciphers over the past decades has been to employ block ciphers as one piece of a “mode of operation”—possibly, a way to make a secure symmetric-key cryptosystem, but more generally, any cryptographic application.
Liskov, Moses   +2 more
openaire   +5 more sources

Matrix Power Function Based Block Cipher Operating in CBC Mode

open access: yesMathematics, 2022
In our previous study, we proposed a perfectly secure Shannon cipher based on the so-called matrix power function. There we also introduced a concept of single round symmetric encryption, i.e., we used the matrix power function together with some rather ...
Lina Dindiene   +3 more
doaj   +1 more source

Efficient Implementation of PRESENT and GIFT on Quantum Computers

open access: yesApplied Sciences, 2021
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key ...
Kyungbae Jang   +5 more
doaj   +1 more source

Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited

open access: yesIACR Transactions on Symmetric Cryptology, 2022
We construct non-malleable codes in the split-state model with codeword length m + 3λ or m + 5λ, where m is the message size and λ is the security parameter, depending on how conservative one is. Our scheme is very simple and involves a single call to a
Gianluca Brian   +3 more
doaj   +1 more source

SLIM: A Lightweight Block Cipher for Internet of Health Things

open access: yesIEEE Access, 2020
Nowadays, there is a strong demand for increasing the protection of resource-constrained devices such as Radio frequency identification (RFID) systems. Current cryptographic algorithms are sufficient for high-resource desktop computers.
Bassam Aboushosha   +4 more
semanticscholar   +1 more source

The SPEEDY Family of Block Ciphers - Engineering an Ultra Low-Latency Cipher from Gate Level for Secure Processor Architectures

open access: yesIACR Cryptology ePrint Archive, 2021
We introduce SPEEDY, a family of ultra low-latency block ciphers. We mix engineering expertise into each step of the cipher’s design process in order to create a secure encryption primitive with an extremely low latency in CMOS hardware.
G. Leander   +3 more
semanticscholar   +1 more source

Probabilistic Block Cipher [PDF]

open access: yesAnnals of Computer Science and Information Systems, 2018
This paper is devoted to the description of a new block cipher that will be applicable in the post-quantum era and will not need a lot of resources. The main advantages: probabilistic encryption, the cipher block chaining mode, the ability to transfer to distributed systems. All this combined with the use of PRNG, working on the Cremona transformations,
Nikita Zbitnev   +2 more
openaire   +2 more sources

Parallel Implementations of ARIA on ARM Processors and Graphics Processing Unit

open access: yesApplied Sciences, 2022
The ARIA block cipher algorithm is Korean standard, IETF standard (RFC 5794), and part of the TLS/SSL protocol. In this paper, we present the parallel implementation of ARIA block cipher on ARMv8 processors and GPU.
Siwoo Eum   +5 more
doaj   +1 more source

Designing pair of nonlinear components of a block cipher over quaternion integers

open access: yesAIMS Mathematics, 2023
In the field of cryptography, block ciphers are widely used to provide confidentiality and integrity of data. One of the key components of a block cipher is its nonlinear substitution function.
Muhammad Sajjad   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy