Results 31 to 40 of about 1,634 (284)

A New Method for Format Preserving Encryption in High-Data Rate Communications

open access: yesIEEE Access, 2020
In some encryption systems it is necessary to preserve the format and length of the encrypted data. This kind of encryption is called FPE (Format Preserving Encryption).
Adrian Perez-Resa   +3 more
doaj   +1 more source

Periodicity Detection of the Substitution Box in the CBC Mode of Operation: Experiment and Study

open access: yesIEEE Access, 2023
This paper presents a technique for investigating the cyclic properties of substitution boxes (S-boxes) in the Cipher Block Chaining (CBC) mode of operation.
Zhanna Alimzhanova   +2 more
doaj   +1 more source

The Area-Latency Symbiosis: Towards Improved Serial Encryption Circuits

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
The bit-sliding paper of Jean et al. (CHES 2017) showed that the smallest-size circuit for SPN based block ciphers such as AES, SKINNY and PRESENT can be achieved via bit-serial implementations.
Fatih Balli   +2 more
doaj   +3 more sources

Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms

open access: yesIACR Transactions on Symmetric Cryptology, 2020
In this article, we propose two new families of very lightweight and efficient authenticated encryption with associated data (AEAD) modes, Romulus and Remus, that provide security beyond the birthday bound with respect to the block-length n.
Tetsu Iwata   +3 more
doaj   +1 more source

Self-Synchronized Encryption for Physical Layer in Gigabit Ethernet Optical Links

open access: yesIEEE Access, 2020
In this work a new self-synchronized symmetric encryption solution for high speed communication systems necessary to preserve the format of the plaintext is proposed, developed and tested.
Adrian Perez-Resa   +3 more
doaj   +1 more source

Efficient Implementation of ARX-Based Block Ciphers on 8-Bit AVR Microcontrollers

open access: yesMathematics, 2020
As the development of Internet of Things (IoT), the data exchanged through the network has significantly increased. To secure the sensitive data with user’s personal information, it is necessary to encrypt the transmitted data. Since resource-constrained
YoungBeom Kim   +4 more
doaj   +1 more source

Highly Efficient Implementation of Block Ciphers on Graphic Processing Units for Massively Large Data

open access: yesApplied Sciences, 2020
With the advent of IoT and Cloud computing service technology, the size of user data to be managed and file data to be transmitted has been significantly increased.
SangWoo An, Seog Chung Seo
doaj   +1 more source

Analyzing the Performance of the Advanced Encryption Standard Block Cipher Modes of Operation: Highlighting the National Institute of Standards and Technology Recommendations

open access: diamond, 2016
When using a symmetric encryption algorithm, specifically the AES, the Block Cipher Mode of Operation to be used must be specified. Usually choosing the mode of operation is influenced by two main factors: 1. Security; and the 2. Performance of the mode.
Abdelrahman Altigani   +2 more
openalex   +3 more sources

VERNAM CIPHER BASED METHOD OF PROTECTION FOR DATA TRANSFERRED BETWEEN UNMANNED AIRCRAFT AND GROUND CONTROL STATION [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2016
The paper deals with questions of protection against unauthorized access to the data transmitted between unmanned aircraft vehicle (UAV) and ground control station (GCS).
I. A. Avdonin, M. B. Budko, V. A. Grozov
doaj   +1 more source

1, 2, 3, Fork: Counter Mode Variants based on a Generalized Forkcipher

open access: yesIACR Transactions on Symmetric Cryptology, 2021
A multi-forkcipher (MFC) is a generalization of the forkcipher (FC) primitive introduced by Andreeva et al. at ASIACRYPT’19. An MFC is a tweakable cipher that computes s output blocks for a single input block, with s arbitrary but fixed.
Elena Andreeva   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy