Results 21 to 30 of about 1,634 (284)

New mode of operation inspired by the braid of long hair [PDF]

open access: yesRevista Română de Informatică și Automatică, 2023
In cryptography, a mode of operation is the way of processing plaintext and encrypted text blocks within a block cipher algorithm, or it is the presentation of a method of chaining blocks in a block cipher.
Hana ALI-PACHA   +2 more
doaj   +1 more source

Performance Evaluation of Authentication-Encryption and Confidentiality Block Cipher Modes of Operation on Digital Image [PDF]

open access: diamond, 2017
Recently, security of digital images has attracted significant attention. This paper evaluates the performance of authentication-encryption and confidentiality block cipher modes of operation, on digital image.
Narges Mehran   +1 more
openalex   +2 more sources

On one Block Cipher Mode of Operation Used to Protect Data on Block-Oriented Storage Devices

open access: yesСовременные информационные технологии и IT-образование, 2022
This research purpose is to develop a reduction-based method for analysis of cryptographic properties of block cipher modes of operation in context of full disk encryption (FDE) via provable security technique, to study weaknesses of widely spread among ...
Georgii Firsov, Alisa Koreneva
doaj   +1 more source

Efficient Parallel Implementation of CTR Mode of ARX-Based Block Ciphers on ARMv8 Microcontrollers

open access: yesApplied Sciences, 2021
With the advancement of 5G mobile telecommunication, various IoT (Internet of Things) devices communicate massive amounts of data by being connected to wireless networks.
JinGyo Song, Seog Chung Seo
doaj   +1 more source

KOMBINASI CAESAR CIPHER DAN REVERSE CIPHER BERDASARKAN CIPHER BLOCK CHAINING

open access: yesMajalah Ilmiah Matematika dan Statistika, 2021
Communication in the current era of globalization is very developed. Many applications that can be used to facilitate communication. However, because of this convenience, the security of the information contained in it will be more easily hacked by ...
Maulidyah Lailatun Najah   +1 more
doaj   +1 more source

Secure HIGHT Implementation on ARM Processors

open access: yesMathematics, 2021
Secure and compact designs of HIGHT block cipher on representative ARM microcontrollers are presented in this paper. We present several optimizations for implementations of the HIGHT block cipher, which exploit different parallel approaches, including ...
Hwajeong Seo   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy