Results 31 to 40 of about 1,634 (284)
A New Method for Format Preserving Encryption in High-Data Rate Communications
In some encryption systems it is necessary to preserve the format and length of the encrypted data. This kind of encryption is called FPE (Format Preserving Encryption).
Adrian Perez-Resa +3 more
doaj +1 more source
Periodicity Detection of the Substitution Box in the CBC Mode of Operation: Experiment and Study
This paper presents a technique for investigating the cyclic properties of substitution boxes (S-boxes) in the Cipher Block Chaining (CBC) mode of operation.
Zhanna Alimzhanova +2 more
doaj +1 more source
The Area-Latency Symbiosis: Towards Improved Serial Encryption Circuits
The bit-sliding paper of Jean et al. (CHES 2017) showed that the smallest-size circuit for SPN based block ciphers such as AES, SKINNY and PRESENT can be achieved via bit-serial implementations.
Fatih Balli +2 more
doaj +3 more sources
Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms
In this article, we propose two new families of very lightweight and efficient authenticated encryption with associated data (AEAD) modes, Romulus and Remus, that provide security beyond the birthday bound with respect to the block-length n.
Tetsu Iwata +3 more
doaj +1 more source
Self-Synchronized Encryption for Physical Layer in Gigabit Ethernet Optical Links
In this work a new self-synchronized symmetric encryption solution for high speed communication systems necessary to preserve the format of the plaintext is proposed, developed and tested.
Adrian Perez-Resa +3 more
doaj +1 more source
Efficient Implementation of ARX-Based Block Ciphers on 8-Bit AVR Microcontrollers
As the development of Internet of Things (IoT), the data exchanged through the network has significantly increased. To secure the sensitive data with user’s personal information, it is necessary to encrypt the transmitted data. Since resource-constrained
YoungBeom Kim +4 more
doaj +1 more source
With the advent of IoT and Cloud computing service technology, the size of user data to be managed and file data to be transmitted has been significantly increased.
SangWoo An, Seog Chung Seo
doaj +1 more source
When using a symmetric encryption algorithm, specifically the AES, the Block Cipher Mode of Operation to be used must be specified. Usually choosing the mode of operation is influenced by two main factors: 1. Security; and the 2. Performance of the mode.
Abdelrahman Altigani +2 more
openalex +3 more sources
VERNAM CIPHER BASED METHOD OF PROTECTION FOR DATA TRANSFERRED BETWEEN UNMANNED AIRCRAFT AND GROUND CONTROL STATION [PDF]
The paper deals with questions of protection against unauthorized access to the data transmitted between unmanned aircraft vehicle (UAV) and ground control station (GCS).
I. A. Avdonin, M. B. Budko, V. A. Grozov
doaj +1 more source
1, 2, 3, Fork: Counter Mode Variants based on a Generalized Forkcipher
A multi-forkcipher (MFC) is a generalization of the forkcipher (FC) primitive introduced by Andreeva et al. at ASIACRYPT’19. An MFC is a tweakable cipher that computes s output blocks for a single input block, with s arbitrary but fixed.
Elena Andreeva +3 more
doaj +1 more source

