Results 51 to 60 of about 2,386,676 (394)
Comparison analysis of stream cipher algorithms for digital communication [PDF]
The broadcast nature of radio communication such as in the HF (High Frequency) spectrum exposes the transmitted information to unauthorized third parties. Confidentiality is ensured by employing cipher system.
Mat Sidek, Abd. Rahim+1 more
core +1 more source
New primitives of controlled elements F2/4 for block ciphers [PDF]
This paper develops the cipher design approach based on the use of data-dependent operations (DDOs). A new class of DDO based on the advanced controlled elements (CEs) is introduced, which is proven well suited to hardware implementations for FPGA ...
Cong, Manh Tran+4 more
core +3 more sources
Fixed Point Attack in PGV-5 Scheme Using SIMON Algorithm [PDF]
Block cipher-based hash function is a hash function that is constructed by applying a block cipher algorithm on a scheme to form a hash algorithm. So that the strength of the block cipher-based hash function depends on the strength of a block cipher ...
Risqi, Y.S. Sofu+2 more
core +1 more source
We introduce a new concept of elastic block ciphers, symmetric-key encryption algorithms that for a variable size input do not expand the plaintext, (i.e., do not require plaintext padding), while maintaining the diffusion property of traditional block ciphers and adjusting their computational load proportionally to the size increase.
Cook, Debra L.+2 more
openaire +2 more sources
Designing a Block Cipher in Galois Extension Fields for IoT Security
This paper focuses on a block cipher adaptation of the Galois Extension Fields (GEF) combination technique for PRNGs and targets application in the Internet of Things (IoT) space, an area where the combination technique was concluded as a quality stream ...
Kiernan George, Alan J. Michaels
doaj +1 more source
Compact Implementations of HIGHT Block Cipher on IoT Platforms
Recent lightweight block cipher competition (FELICS Triathlon) evaluates efficient implementations of block ciphers for Internet of things (IoT) environment.
B. Kim+4 more
semanticscholar +1 more source
We present a new block cipher LED. While dedicated to compact hardware implementation, and offering the smallest silicon footprint among comparable block ciphers, the cipher has been designed to simultaneously tackle three additional goals. First, we explore the role of an ultra-light (in fact non-existent) key schedule.
Axel Poschmann+3 more
openaire +2 more sources
The New Block Cipher Design (Tigris Cipher) [PDF]
Abstract—In the present paper we have proposed a new variant of AES cipher with high level of security and an elegant construction called TIGRIS cipher. The TIGRIS name has been derived from one of the two famous rivers in Iraq. The proposed TIGRIS cipher is a revision for the proposed Euphrates cipher which has already been published.
Abdul Monem S. Rahma+2 more
openaire +1 more source
Summary of Topological Study of Chaotic CBC Mode of Operation [PDF]
International audience—In cryptography, block ciphers are the most fundamental elements in many symmetric-key encryp-tion systems. The Cipher Block Chaining, denoted CBC, presents one of the most famous mode of operation that uses a block cipher to ...
Abidi, Abdessalem+4 more
core +3 more sources
Single Key Variant of PMAC_Plus
At CRYPTO 2011, Yasuda proposed the PMAC_Plus message authentication code based on an n-bit block cipher. Its design principle inherits the well known PMAC parallel network with a low additional cost.
Nilanjan Datta+4 more
doaj +1 more source