Results 31 to 40 of about 2,395,070 (371)
How to distinguish between a block cipher and a random permutation by lowering the input entropy [PDF]
IEEE 35th International Carnahan Conference on Security Technology. Londres, 16-19 October 2001A novel cryptanalysis technique is presented, and its suitability for distinguishing a block cipher algorithm or a hash function from a random permutation is ...
González-Tablas, Ana Isabel+3 more
core +3 more sources
Block cipher four implementation on field programmable gate array
Block ciphers are used to protect data in information systems from being leaked to unauthorized people. One of many block cipher algorithms developed by Indonesian researchers is the BCF (Block Cipher-Four) - a block cipher with 128-bit input/output that
Yusuf Kurniawan, Muhammad Adli Rizqulloh
doaj +1 more source
A General Analysis of the Security of Elastic Block Ciphers [PDF]
We analyze the security of elastic block ciphers in general to show that an attack on an elastic version of block cipher implies a polynomial time related attack on the fixed-length version of the block cipher.
Cook, Debra L.+2 more
core +2 more sources
KLEIN: A New Family of Lightweight Block Ciphers [PDF]
Resource-efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes.
A. Bogdanov+39 more
core +11 more sources
Counter Mode Development for Block Cipher Operations [PDF]
There are two basic types of symmetric algorithms: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer.
Ali Sagheer
doaj +1 more source
On Elastic Block Ciphers and Their Differential and Linear Cryptanalyses [PDF]
Motivated by applications such as databases with nonuniform field lengths, we introduce the concept of an elastic block cipher, a new approach to variable length block ciphers which incorporates fixed sized cipher components into a new network structure.
Cook, Debra L.+2 more
core +2 more sources
New Constructions of MACs from (Tweakable) Block Ciphers
We propose new constructions of Message Authentication Codes (MACs) from tweakable or conventional block ciphers. Our new schemes are either stateless and deterministic, nonce-based, or randomized, and provably secure either in the standard model for ...
Benoît Cogliati+2 more
doaj +1 more source
High-Speed Fault Attack Resistant Implementation of PIPO Block Cipher on ARM Cortex-A
In ICISC’20 conference, PIPO (Plug-In and Plug-Out) was proposed as an efficient block cipher for secure communication in IoT (Internet of Things) environment.
Jingyo Song+2 more
doaj +1 more source
Quantitative Evaluation of Chaotic CBC Mode of Operation [PDF]
The cipher block chaining (CBC) block cipher mode of operation presents a very popular way of encrypting which is used in various applications. In previous research work, we have mathematically proven that, under some conditions, this mode of operation ...
Abidi, Abdessalem+4 more
core +3 more sources
An Enhancement Method Based on Modifying CFB Mode for Key Generation in AES Algorithm [PDF]
There are two very important characteristics in the block cipher, the amount of time for encryption process and key complexity which caused increasing the complexity of encryption process.
Hasanen S. Abdulah+2 more
doaj +1 more source