Results 231 to 240 of about 1,634 (284)
The offset codebook (OCB) block cipher mode of operation for authenticated encryption
This article presents an overview of the concepts of and motivation for the OCB block cipher mode of operation.
William Stallings
semanticscholar +3 more sources
A Resourceful Combined Block Cipher Mode of Operation for Packetised Network Communication
In this paper a combined block cipher mode of operation is presented that provides an efficient authenticated encryption with associated-data (AEAD) security service for packet-based network communication. Using software simulation we show that our construct, called CYPHER-C3, achieves improvements in processing energy requirement, processing latency ...
A. A. Adekunle, S.R. Woodhead
semanticscholar +3 more sources
Enhanced DFT-Based Chaotic Image Block Cipher with Several Modes of Operation
Chaotic image encryption has been investigated extensively in the literature in different domains, including the frequency domain using Discrete Fourier Transform (DFT).
Mahmoud Y. M. Yassin +3 more
semanticscholar +3 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
An Efficient Hash Based Parallel Block Cipher Mode of Operation
2018 3rd International Conference on Computer and Communication Systems (ICCCS), 2018Block cipher encryption works on fixed length blocks, usually 128bits. The blocks of data are transformed into encrypted data blocks of identical size using a shared session key. A common feature of some modes of block cipher, such as Cipher Block Chaining mode (CBC), Cipher Feedback mode (CFB), Output Feedback mode (OFB), is the sequential processing.
Aqeel Sahi, David Lai, Yan Li
openaire +2 more sources
Building a block cipher mode of operation with feedback keys
2013 IEEE International Symposium on Industrial Electronics, 2013In this paper, we propose two block cipher modes of operation (BCMO for short), named the Key Stream Protection Chain mode (KSPC for short) and Output Dual Chaining mode (ODC for short), which differ from other existing BCMOs in that in the KSPC, the ciphertext block and in the ODC, the block cipher encryption unit's output are fed back to the ...
Yi-Li Huang +6 more
openaire +2 more sources
NIST Block Cipher Modes of Operation for Confidentiality
In this article, we describe the five block cipher modes of operation that have been approved by the National Institute of Standards and Technology (NIST) for confidentiality. Each mode specifies an algorithm for encrypting/decrypting data sequences that are longer than a single block.
William Stallings
openalex +2 more sources
Design of Chaotic Block Cipher Operation Mode for Intelligent Transportation Systems
2019 IEEE International Conference on Consumer Electronics (ICCE), 2019Information security is a vital aspect of Intelligent Transportation Systems (ITS) involving public data collection. Road images captured for use as a basis of traffic manipulation in ITS should take all precautions for encrypting the wirelessly transferred image.
Graham Thoms +2 more
openaire +2 more sources
Improved Block Cipher Counter Mode of Operation Schemes
2005The main goals of presented research were the analysis of the base block cipher protectability from cryptanalytic attacks in standard modes of operation and the ways to increase the stream modes of operation security. We also paid special attention to the problem of the gamma overlapping.
Ivan Gorbenko, Sergiy Golovashych
openaire +2 more sources
Energy-Security Adaptation Scheme of Block Cipher Mode of Operations
International Symposium on Symbolic Computation in Software Science, 2009With rapid growth in wireless network technologies, there is high need for secure communication in such as highly heterogeneous environment. Since mobile wireless devices have limited battery capacity, wireless network security should make optimal use of this resource. Implementing security is challenging under this condition.
Amit K. Beeputh +2 more
openaire +2 more sources
Probabilistic Error Analysis of Operation Mode in Block Cipher
International Journal of Advancements in Computing Technology, 2013Jinkeun Hong
openaire +2 more sources

