New mode of operation inspired by the braid of long hair [PDF]
In cryptography, a mode of operation is the way of processing plaintext and encrypted text blocks within a block cipher algorithm, or it is the presentation of a method of chaining blocks in a block cipher.
Hana ALI-PACHA +2 more
doaj +1 more source
Padding Oracle Attack on Block Cipher with CBC|CBC-Double Mode of Operation using the BOZ-PAD
Seongjin Hwang, Changhoon Lee
openalex +3 more sources
Performance Evaluation of Authentication-Encryption and Confidentiality Block Cipher Modes of Operation on Digital Image [PDF]
Recently, security of digital images has attracted significant attention. This paper evaluates the performance of authentication-encryption and confidentiality block cipher modes of operation, on digital image.
Narges Mehran +1 more
openalex +2 more sources
Safety Comparison Analysis Against Known/Chosen Plaintext Attack of RBF (Random Block Feedback) Mode to Other Block Cipher Modes of Operation [PDF]
Yoon-Jeong Kim, Kang Yi
openalex +2 more sources
On one Block Cipher Mode of Operation Used to Protect Data on Block-Oriented Storage Devices
This research purpose is to develop a reduction-based method for analysis of cryptographic properties of block cipher modes of operation in context of full disk encryption (FDE) via provable security technique, to study weaknesses of widely spread among ...
Georgii Firsov, Alisa Koreneva
doaj +1 more source
Recommendation for Block Cipher Modes of Operation:
Morris J. Dworkin
openalex +2 more sources
Efficient Parallel Implementation of CTR Mode of ARX-Based Block Ciphers on ARMv8 Microcontrollers
With the advancement of 5G mobile telecommunication, various IoT (Internet of Things) devices communicate massive amounts of data by being connected to wireless networks.
JinGyo Song, Seog Chung Seo
doaj +1 more source
KOMBINASI CAESAR CIPHER DAN REVERSE CIPHER BERDASARKAN CIPHER BLOCK CHAINING
Communication in the current era of globalization is very developed. Many applications that can be used to facilitate communication. However, because of this convenience, the security of the information contained in it will be more easily hacked by ...
Maulidyah Lailatun Najah +1 more
doaj +1 more source
Secure HIGHT Implementation on ARM Processors
Secure and compact designs of HIGHT block cipher on representative ARM microcontrollers are presented in this paper. We present several optimizations for implementations of the HIGHT block cipher, which exploit different parallel approaches, including ...
Hwajeong Seo +7 more
doaj +1 more source

