Results 241 to 250 of about 1,634 (284)
Some of the next articles are maybe not open access.
Comparing Block Cipher Modes of Operation on MICAz Sensor Nodes
2009 17th Euromicro International Conference on Parallel, Distributed and Network-based Processing, 2009Wireless sensor networks are a key technology for "ubiquitous computing" applications. The challenges of securing such networks are tremendous. On the one side, sensor nodes are commonly deployed in potentially hostile environments, which requires additional protection in comparison to traditional computing systems.
Gernot R. Bauer +2 more
openaire +1 more source
Related-Mode Attacks on Block Cipher Modes of Operation
2005In this paper, we present a generalization of the notion of the recently proposed related-cipher attacks. In particular, we show that when the cryptanalyst has access to an oracle under one mode, then almost all other related-cipher modes can be attacked with ease.
Raphael C. –W. Phan +1 more
openaire +1 more source
Block Ciphers and Modes of Operation
2012Most modern private-key encryption schemes are built from two ingredients: a block cipher and a mode of operation. Block ciphers are cryptographic primitives that provide encryption and decryption functions which operate on strings of a fixed size (blocks).
openaire +1 more source
Block Ciphers and Modes of Operation
2015The basic description of a block cipher is shown in Figure 13.1. Block ciphers operate on blocks of plaintext one at a time to produce blocks of ciphertext. The block of plaintext and the block of ciphertext are assumed to be of the same size, e.g. a block of n bits. Every string of n bits in the domain should map to a string of n bits in the codomain,
openaire +1 more source
Block Cipher Modes of Operation for Heterogeneous Format Preserving Encryption
2017Format-preserving encryption (FPE), a kind of symmetric encryption, has caught a great deal of attention of late years. FPE, as the name suggests, does not change the format of inputs which may include the length of inputs, coding of characters or data size of inputs.
Toshiya Shimizu, Takeshi Shimoyama
openaire +1 more source
Summary of the NIST Block Cipher Modes of Operation Workshop 2023
Morris Dworkin
openalex +2 more sources
IEEE Transactions on Emerging Topics in Computing
In-memory computing (IMC) emerges as one of the most promising computing technologies for data-intensive applications to ameliorate the “memory wall” bottleneck in von Neumann computer systems.
Andrew Dervay, Wenfeng Zhao
semanticscholar +1 more source
In-memory computing (IMC) emerges as one of the most promising computing technologies for data-intensive applications to ameliorate the “memory wall” bottleneck in von Neumann computer systems.
Andrew Dervay, Wenfeng Zhao
semanticscholar +1 more source
Symmetric Encryption Scheme Based on Quasigroup Using Chained Mode of Operation
Journal of Discrete Mathematical Sciences and CryptographyIn this paper, we propose a novel construction for a symmetric encryption scheme, referred as SEBQ which is built on the structure of quasigroup. Utilizing the concepts of chaining like mode of operation, SEBQ is a block cipher with various in-built ...
Satish Kumar +3 more
semanticscholar +1 more source
Parallelization of Standard Modes of Operation for Symmetric Key Block Ciphers
2007In this paper we present the parallelization process of standard modes of operation for symmetric key block ciphers: ECB, CBC, CFB, OFB and CTR along with the description of exploited parallelization tools. The data dependencies analysis of loops and loop transformations were applied in order to parallelize sequential algorithms.
Wlodzimierz Bielecki, Dariusz Burak
openaire +1 more source

