Results 51 to 60 of about 2,386,676 (394)

Comparison analysis of stream cipher algorithms for digital communication [PDF]

open access: yes, 2007
The broadcast nature of radio communication such as in the HF (High Frequency) spectrum exposes the transmitted information to unauthorized third parties. Confidentiality is ensured by employing cipher system.
Mat Sidek, Abd. Rahim   +1 more
core   +1 more source

New primitives of controlled elements F2/4 for block ciphers [PDF]

open access: yes, 2020
This paper develops the cipher design approach based on the use of data-dependent operations (DDOs). A new class of DDO based on the advanced controlled elements (CEs) is introduced, which is proven well suited to hardware implementations for FPGA ...
Cong, Manh Tran   +4 more
core   +3 more sources

Fixed Point Attack in PGV-5 Scheme Using SIMON Algorithm [PDF]

open access: yes, 2015
Block cipher-based hash function is a hash function that is constructed by applying a block cipher algorithm on a scheme to form a hash algorithm. So that the strength of the block cipher-based hash function depends on the strength of a block cipher ...
Risqi, Y.S. Sofu   +2 more
core   +1 more source

Elastic Block Ciphers [PDF]

open access: yesIACR Cryptology ePrint Archive, 2004
We introduce a new concept of elastic block ciphers, symmetric-key encryption algorithms that for a variable size input do not expand the plaintext, (i.e., do not require plaintext padding), while maintaining the diffusion property of traditional block ciphers and adjusting their computational load proportionally to the size increase.
Cook, Debra L.   +2 more
openaire   +2 more sources

Designing a Block Cipher in Galois Extension Fields for IoT Security

open access: yesIoT, 2021
This paper focuses on a block cipher adaptation of the Galois Extension Fields (GEF) combination technique for PRNGs and targets application in the Internet of Things (IoT) space, an area where the combination technique was concluded as a quality stream ...
Kiernan George, Alan J. Michaels
doaj   +1 more source

Compact Implementations of HIGHT Block Cipher on IoT Platforms

open access: yesSecur. Commun. Networks, 2019
Recent lightweight block cipher competition (FELICS Triathlon) evaluates efficient implementations of block ciphers for Internet of things (IoT) environment.
B. Kim   +4 more
semanticscholar   +1 more source

The LED Block Cipher [PDF]

open access: yes, 2011
We present a new block cipher LED. While dedicated to compact hardware implementation, and offering the smallest silicon footprint among comparable block ciphers, the cipher has been designed to simultaneously tackle three additional goals. First, we explore the role of an ultra-light (in fact non-existent) key schedule.
Axel Poschmann   +3 more
openaire   +2 more sources

The New Block Cipher Design (Tigris Cipher) [PDF]

open access: yesInternational Journal of Computer Network and Information Security, 2015
Abstract—In the present paper we have proposed a new variant of AES cipher with high level of security and an elegant construction called TIGRIS cipher. The TIGRIS name has been derived from one of the two famous rivers in Iraq. The proposed TIGRIS cipher is a revision for the proposed Euphrates cipher which has already been published.
Abdul Monem S. Rahma   +2 more
openaire   +1 more source

Summary of Topological Study of Chaotic CBC Mode of Operation [PDF]

open access: yes, 2016
International audience—In cryptography, block ciphers are the most fundamental elements in many symmetric-key encryp-tion systems. The Cipher Block Chaining, denoted CBC, presents one of the most famous mode of operation that uses a block cipher to ...
Abidi, Abdessalem   +4 more
core   +3 more sources

Single Key Variant of PMAC_Plus

open access: yesIACR Transactions on Symmetric Cryptology, 2017
At CRYPTO 2011, Yasuda proposed the PMAC_Plus message authentication code based on an n-bit block cipher. Its design principle inherits the well known PMAC parallel network with a low additional cost.
Nilanjan Datta   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy