Results 21 to 30 of about 44,265 (336)

Tweakable Block Ciphers [PDF]

open access: yesJournal of Cryptology, 2002
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Liskov, Moses   +2 more
openaire   +4 more sources

Proposal of New Block Cipher Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2010
Speed and complexity are two important properties in the block cipher.The block length of the block cipher controls these two aspects. The speedlimitation enforces the designer to build block cipher system as hardwareprototype.
Hilal Hadi Salih   +2 more
doaj   +1 more source

Matrix Power Function Based Block Cipher Operating in CBC Mode

open access: yesMathematics, 2022
In our previous study, we proposed a perfectly secure Shannon cipher based on the so-called matrix power function. There we also introduced a concept of single round symmetric encryption, i.e., we used the matrix power function together with some rather ...
Lina Dindiene   +3 more
doaj   +1 more source

COUNTER MODE DEVELOPMENT FOR BLOCK CIPHER OPERATIONS [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2012
There are two basic types of symmetric cipher: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer. Stream ciphers operate on streams of plaintext and ciphertext one bit or
Ali M. Sagheer, Ahmed T. Suod
doaj   +1 more source

Efficient Implementation of PRESENT and GIFT on Quantum Computers

open access: yesApplied Sciences, 2021
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key ...
Kyungbae Jang   +5 more
doaj   +1 more source

Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited

open access: yesIACR Transactions on Symmetric Cryptology, 2022
We construct non-malleable codes in the split-state model with codeword length m + 3λ or m + 5λ, where m is the message size and λ is the security parameter, depending on how conservative one is. Our scheme is very simple and involves a single call to a
Gianluca Brian   +3 more
doaj   +1 more source

Working Mode Recognition for SM4 Algorithm Based on Transformer [PDF]

open access: yesJisuanji gongcheng, 2023
Cipher algorithm recognition is a prerequisite for cryptanalysis and supervision of cryptographic equipment. Based on the summary and analyses of existing cipher algorithm recognition schemes, this study uses the K-Nearest Neighbor(KNN) algorithm and a ...
Yaping CHI, Ziyan YUE, Yuheng LIN
doaj   +1 more source

Parallel Implementations of ARIA on ARM Processors and Graphics Processing Unit

open access: yesApplied Sciences, 2022
The ARIA block cipher algorithm is Korean standard, IETF standard (RFC 5794), and part of the TLS/SSL protocol. In this paper, we present the parallel implementation of ARIA block cipher on ARMv8 processors and GPU.
Siwoo Eum   +5 more
doaj   +1 more source

How to distinguish between a block cipher and a random permutation by lowering the input entropy [PDF]

open access: yes, 2001
IEEE 35th International Carnahan Conference on Security Technology. Londres, 16-19 October 2001A novel cryptanalysis technique is presented, and its suitability for distinguishing a block cipher algorithm or a hash function from a random permutation is ...
González-Tablas, Ana Isabel   +3 more
core   +3 more sources

Block cipher four implementation on field programmable gate array

open access: yesCommunications in Science and Technology, 2020
Block ciphers are used to protect data in information systems from being leaked to unauthorized people. One of many block cipher algorithms developed by Indonesian researchers is the BCF (Block Cipher-Four) - a block cipher with 128-bit input/output that
Yusuf Kurniawan, Muhammad Adli Rizqulloh
doaj   +1 more source

Home - About - Disclaimer - Privacy