Results 31 to 40 of about 1,458 (171)
Recently, massive research works have been accomplished for augmenting privacy and security requirements for cybersecurity applications in wireless communication networks.
Osama S. Faragallah +6 more
doaj +1 more source
Designing a New XTS-AES Parallel Optimization Implementation Technique for Fast File Encryption
XTS-AES is a disk encryption mode of operation that uses the block cipher AES. Several studies have been conducted to improve the encryption speed using XTS-AES according to the increasing disk size.
Sangwoo An, Seog Chung Seo
doaj +1 more source
A Note on a CBC-Type Mode of Operation
. In this paper we formally introduce a novel mode of operation based on the cipher block chaining mode. The main idea of this mode is to use a stateful block cipher instead of a stateless one.
George Teşeleanu
semanticscholar +1 more source
ACE: ARIA-CTR Encryption for Low-End Embedded Processors
In this paper, we present the first optimized implementation of ARIA block cipher on low-end 8-bit Alf and Vegard’s RISC processor (AVR) microcontrollers.
Hwajeong Seo +3 more
doaj +1 more source
A quantum encryption design featuring confusion, diffusion, and mode of operation
Quantum cryptography—the application of quantum information processing and quantum computing techniques to cryptography has been extensively investigated.
Zixuan Hu, Sabre Kais
doaj +1 more source
On the Quantum Security of OCB
The OCB mode of operation for block ciphers has three variants, OCB1, OCB2 and OCB3. OCB1 and OCB3 can be used as secure authenticated encryption schemes whereas OCB2 has been shown to be classically insecure (Inoue et al., Crypto 2019).
Varun Maram +3 more
doaj +1 more source
Patterned Cipher Block for Low-Latency Secure Communication
Despite the increasing importance of network security, increasing Internet of Things (IoT) uptake and traffic tends to apply tighter resource constraints for cryptography.
Seounghwan Oh +2 more
doaj +1 more source
SUNDAE: Small Universal Deterministic Authenticated Encryption for the Internet of Things
Lightweight cryptography was developed in response to the increasing need to secure devices for the Internet of Things. After significant research effort, many new block ciphers have been designed targeting lightweight settings, optimizing efficiency ...
Subhadeep Banik +3 more
doaj +1 more source
Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher
This paper defines Spook: a sponge-based authenticated encryption with associated data algorithm. It is primarily designed to provide security against side-channel attacks at a low energy cost. For this purpose, Spook is mixing a leakageresistant mode of
Davide Bellizia +14 more
doaj +1 more source
Design, Implementation, and Analysis of a Block Cipher Based on a Secure Chaotic Generator
This work proposes a new secure chaos-based encryption/decryption system, operating in cipher block chaining (CBC) mode, and analyze its performance. The cryptosystem includes a robust pseudorandom number generator of chaotic sequences (PRNG-CS).
Fethi Dridi +4 more
doaj +1 more source

