Results 31 to 40 of about 44,002 (291)

A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]

open access: yes, 2018
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal   +2 more
core   +2 more sources

Iterative Block Ciphers from Tweakable Block Ciphers with Long Tweaks

open access: yesIACR Transactions on Symmetric Cryptology, 2020
We consider a problem of constructing a secure block cipher from a tweakable block cipher (TBC) with long tweaks. Given a TBC with n-bit blocks and Γn-bit tweaks for Γ ≥ 1, one of the constructions by Minematsu in DCC 2015 shows that a simple iteration ...
Ryota Nakamichi, Tetsu Iwata
doaj   +1 more source

Parallel Implementation of PIPO and Its Application for Format Preserving Encryption

open access: yesIEEE Access, 2022
The PIPO block cipher, a domestic lightweight block cipher, was announced at ICISC’20. In particular, the bitslicing technique is implemented in the S-Layer for the PIPO block cipher.
Hyunji Kim   +5 more
doaj   +1 more source

Cryptanalysis of a chaotic block cipher with external key and its improved version [PDF]

open access: yes, 2006
Recently, Pareek et al. proposed a symmetric key block cipher using multiple one-dimensional chaotic maps. This paper reports some new findings on the security problems of this kind of chaotic cipher: 1) a number of weak keys exists; 2) some important ...
Alvarez   +12 more
core   +2 more sources

Enhancing Embedded Data Security By Turns Cipher Block Chaining Mode Into Stream Cipher [PDF]

open access: yesEngineering and Technology Journal, 2009
In this paper, a secure data hiding method is introduced. It increases the security of embedded data through combining between the steganography and cryptography. First, the secrete message is divided into blocks with same size according to length of key
Salah Mahdi Saleh
doaj   +1 more source

A New Type of Cipher: DICING_csb [PDF]

open access: yes, 2007
In this paper, we will propose a new type of cipher named DICING_csb, which is derived from our previous stream cipher DICING. It has applied a stream of subkey and an encryption form of block ciphers, so it may be viewed as a combinative of stream ...
Li, An-Ping
core   +2 more sources

Preoperative Cytopenia in Patients Affected by High‐Risk Neuroblastoma: Just a Matter of Platelets?

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background and Aims In patients affected by high‐risk neuroblastoma (HR‐NB), complete macroscopic resection (CMR) is associated with better outcomes. These patients are often cytopenic due to intensive induction regimens. The aim of the present study is to assess the impact of preoperative cytopenia on surgical outcome in patients with HR‐NB ...
Giorgio Persano   +13 more
wiley   +1 more source

Counter Mode of the Shannon Block Cipher Based on MPF Defined over a Non-Commuting Group

open access: yesMathematics, 2022
In this paper, we present a counter mode of a Shannon block cipher based on the matrix power function. We make use of the matrix power function to define a single round symmetric cipher.
Aleksejus Mihalkovich   +2 more
doaj   +1 more source

Prolonged Corrected QT Interval as an Early Electrocardiographic Marker of Cyclophosphamide‐Induced Cardiotoxicity in Pediatric Hematology and Oncology Patients

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Cyclophosphamide (CY) is associated with potentially fatal cardiotoxicity, yet no electrocardiographic indices have been established for early detection of CY‐induced cardiomyopathy. This study aimed to determine whether corrected QT interval (QTc) prolongation can predict early onset of CY‐related cardiac dysfunction in pediatric ...
Junpei Kawamura   +5 more
wiley   +1 more source

Pengembangan Modul Enkripsi dan Dekripsi pada Php dengan Modifikasi Metode Kriptografi Vigenere Cipher dan Cipher Block Chaining (Studi Kasus pada Geekybyte.com) [PDF]

open access: yes, 2014
Penggunaan fungsi hash pada pengamanan data atau informasi pada sebuah web site sudah tidak aman lagi, karena memiliki kelemahan berupa collision. Pengamanan yang dilakukan tidak tergantung pada kerahasiaan metode atau algortima yang digunakan, tetapi ...
Aribowo, E. (Eko)   +1 more
core  

Home - About - Disclaimer - Privacy