Results 241 to 250 of about 1,634 (284)
Some of the next articles are maybe not open access.

Comparing Block Cipher Modes of Operation on MICAz Sensor Nodes

2009 17th Euromicro International Conference on Parallel, Distributed and Network-based Processing, 2009
Wireless sensor networks are a key technology for "ubiquitous computing" applications. The challenges of securing such networks are tremendous. On the one side, sensor nodes are commonly deployed in potentially hostile environments, which requires additional protection in comparison to traditional computing systems.
Gernot R. Bauer   +2 more
openaire   +1 more source

Related-Mode Attacks on Block Cipher Modes of Operation

2005
In this paper, we present a generalization of the notion of the recently proposed related-cipher attacks. In particular, we show that when the cryptanalyst has access to an oracle under one mode, then almost all other related-cipher modes can be attacked with ease.
Raphael C. –W. Phan   +1 more
openaire   +1 more source

Block Ciphers and Modes of Operation

2012
Most modern private-key encryption schemes are built from two ingredients: a block cipher and a mode of operation. Block ciphers are cryptographic primitives that provide encryption and decryption functions which operate on strings of a fixed size (blocks).
openaire   +1 more source

Block Ciphers and Modes of Operation

2015
The basic description of a block cipher is shown in Figure 13.1. Block ciphers operate on blocks of plaintext one at a time to produce blocks of ciphertext. The block of plaintext and the block of ciphertext are assumed to be of the same size, e.g. a block of n bits. Every string of n bits in the domain should map to a string of n bits in the codomain,
openaire   +1 more source

Block Cipher Modes of Operation for Heterogeneous Format Preserving Encryption

2017
Format-preserving encryption (FPE), a kind of symmetric encryption, has caught a great deal of attention of late years. FPE, as the name suggests, does not change the format of inputs which may include the length of inputs, coding of characters or data size of inputs.
Toshiya Shimizu, Takeshi Shimoyama
openaire   +1 more source

BCIM: Constant-Time and High-Throughput Block-Cipher-in-Memory With Massively-Parallel Bit-Serial Execution

IEEE Transactions on Emerging Topics in Computing
In-memory computing (IMC) emerges as one of the most promising computing technologies for data-intensive applications to ameliorate the “memory wall” bottleneck in von Neumann computer systems.
Andrew Dervay, Wenfeng Zhao
semanticscholar   +1 more source

Symmetric Encryption Scheme Based on Quasigroup Using Chained Mode of Operation

Journal of Discrete Mathematical Sciences and Cryptography
In this paper, we propose a novel construction for a symmetric encryption scheme, referred as SEBQ which is built on the structure of quasigroup. Utilizing the concepts of chaining like mode of operation, SEBQ is a block cipher with various in-built ...
Satish Kumar   +3 more
semanticscholar   +1 more source

Parallelization of Standard Modes of Operation for Symmetric Key Block Ciphers

2007
In this paper we present the parallelization process of standard modes of operation for symmetric key block ciphers: ECB, CBC, CFB, OFB and CTR along with the description of exploited parallelization tools. The data dependencies analysis of loops and loop transformations were applied in order to parallelize sequential algorithms.
Wlodzimierz Bielecki, Dariusz Burak
openaire   +1 more source

Home - About - Disclaimer - Privacy