Results 51 to 60 of about 2,395 (159)

Lightweight Structure of Random Key Generation for PRESENT Block Cipher [PDF]

open access: yesInternational Journal of Industrial Electronics, Control and Optimization
In this paper, we design a lightweight and modified random key generation for PRESENT block cipher which is applicable in the encryption of the digital signals. In the block ciphers, the master key is used directly in the encryption process for the data (
Bahram Rashidi
doaj   +1 more source

BLOSTREAM: A HIGH SPEED STREAM CIPHER [PDF]

open access: yesJournal of Engineering Science and Technology, 2017
Although stream ciphers are widely utilized to encrypt sensitive data at fast speeds, security concerns have led to a shift from stream to block ciphers, judging that the current technology in stream cipher is inferior to the technology of block ciphers.
ALI H. KASHMAR, EDDIE S. ISMAIL
doaj  

Statistical Analysis of Encryption Quality for Medical Images Based on Rijndael Encryption Algorithm Using Both Static and Chaotic Cipher Key

open access: yesمجله انفورماتیک سلامت و زیست پزشکی, 2014
Introduction: Growing application of medical information systems and various digital communication channels to transfer and share vital and medical information demonstrate the significance of medical data security and privacy policy.
Mohammadreza Naeemabadi   +2 more
doaj  

FPE scheme based on k-splits Feistel network

open access: yesTongxin xuebao, 2012
The construction features and discipline of Feistel network-based FPE(format-preserving encryption)schemes were analyzed.Considering on the problem that 2-splits Feistel networks-based FPE cipher’s block size was in narrow range,a type-2 Feistel network ...
Jing-wei LI   +3 more
doaj   +2 more sources

Block Cipher Analysis [PDF]

open access: yes, 2009
Blockchifre er kryptografiske primitiver som opererer på tekster af en, af chifferet, specificeret længde. De fleste blockchifre er designet med sikkerhed og effektivitet for øje. Blokchifre anvendes i vid udstrækning til kryptering men indgår eksempelvis også som byggesten i visse hashfunktioner og i såkaldte message authentication codes (MAC ...
openaire  

Parallel Block Encrypting Method Based On Standard Algorithms

open access: yesБезопасность информационных технологий, 2015
Current publication proposes block cipher design that offers availability to specify block size in the initialization phase without maximum block size limit.
Viktor Aleksandrovitch Koryagin   +1 more
doaj  

Cymric: Short-tailed but Mighty

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Authenticated encryption (AE) is a fundamental tool in today’s secure communication. Numerous designs have been proposed, including well-known standards such as GCM.
Alexandre Adomnicăi   +4 more
doaj   +1 more source

Light block cipher algorithm for electric power industry

open access: yesDianxin kexue, 2015
With the development of computer technology,cryptographic algorithms were applied more and more widely in the field of information security.However,it has been a very important problem that how to achieve high performance,high security encryption ...
Tao WANG
doaj   +2 more sources

FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher. [PDF]

open access: yesSensors (Basel), 2019
Abed S, Jaffal R, Mohd BJ, Alshayeji M.
europepmc   +1 more source

Home - About - Disclaimer - Privacy