Results 61 to 70 of about 2,386,676 (394)
Introduction of a Triple Prime Symmetric Key Block Cipher [PDF]
This paper proposes to put forward an innovative algorithm for symmetric key block cipher named as "Triple Prime Symmetric Key Block Cipher with Variable Key-Spaces (TPSKBCVK)" that employs triple prime integers as private key-spaces of varying lengths to encrypt data files. Principles of modular arithmetic have been elegantly used in the proposed idea
arxiv +1 more source
A New Type of Cipher: DICING_csb [PDF]
In this paper, we will propose a new type of cipher named DICING_csb, which is derived from our previous stream cipher DICING. It has applied a stream of subkey and an encryption form of block ciphers, so it may be viewed as a combinative of stream ...
Li, An-Ping
core +2 more sources
Evaluating the origin and spread of spotted lanternfly (Lycorma delicatula) in Japan
The invasive spotted lanternfly (Lycorma delicatula) is native to China and is a serious economic pest in the Republic of Korea and the United States, though it is not considered a pest in Japan. We established a distribution map of L. delicatula in Japan through a comprehensive review of published literature and citizen science reports and analyzed ...
Matthew T. Kamiyama+5 more
wiley +1 more source
BRISK: Dynamic Encryption Based Cipher for Long Term Security
Several emerging areas like the Internet of Things, sensor networks, healthcare and distributed networks feature resource-constrained devices that share secure and privacy-preserving data to accomplish some goal.
Ashutosh Dhar Dwivedi
doaj +1 more source
Hermansky‐Pudlak syndrome type 1 (HPS‐1) is a rare, autosomal recessive disorder with poorly understood renal involvement. Urinary extracellular vesicle (uEV) proteomics and a novel Hps1 mouse model reveal mitochondrial abnormalities and lipid accumulation in HPS‐1 kidney proximal tubule cells. Serum ApoA1 correlates with kidney function in our patient
Dawn M. Maynard+7 more
wiley +1 more source
Beyond quadratic speedups in quantum attacks on symmetric schemes [PDF]
In this paper, we report the first quantum key-recovery attack on a symmetric block cipher design, using classical queries only, with a more than quadratic time speedup compared to the best classical attack. We study the 2XOR-Cascade construction of Ga\v{z}i and Tessaro (EUROCRYPT~2012).
arxiv
This paper introduces QARMA, a new family of lightweight tweakable block ciphers targeted at applications such as memory encryption, the generation of very short tags for hardware-assisted prevention of software exploitation, and the construction of ...
R. Avanzi
semanticscholar +1 more source
A Traceable Block Cipher [PDF]
In this paper we propose a new symmetric block cipher with the following paradoxical traceability properties: it is computationally easy to derive many equivalent secret keys providing distinct descriptions of the same instance of the block cipher. But it is computationally difficult, given one or even up to k equivalent keys, to recover the so called ...
Henri Gilbert, Olivier Billet
openaire +2 more sources
The mitochondrial outer membrane iron–sulphur ([Fe‐S]) protein mitoNEET is a target of the type‐2 diabetes drug pioglitazone. Its unknown molecular function is linked to respiratory complex activity and mitochondrial function. We discovered that O2 protects the mitoNEET [2Fe‐2S] cluster against NO oxidation and desensitization towards reduction by H2S.
Thao Nghi Hoang+9 more
wiley +1 more source
A Review of Block Ciphers and Its Post-Quantum Considerations
Recent advances in cryptography aim to address threats posed by quantum computers. However, these advances have focused disproportionately on asymmetric schemes, while symmetric primitives like block ciphers have received less attention.
R. V. Chethana+3 more
doaj +1 more source