Results 31 to 40 of about 1,458 (171)

Efficiently Encrypting Color Images With Few Details Based on RC6 and Different Operation Modes for Cybersecurity Applications

open access: yesIEEE Access, 2020
Recently, massive research works have been accomplished for augmenting privacy and security requirements for cybersecurity applications in wireless communication networks.
Osama S. Faragallah   +6 more
doaj   +1 more source

Designing a New XTS-AES Parallel Optimization Implementation Technique for Fast File Encryption

open access: yesIEEE Access, 2022
XTS-AES is a disk encryption mode of operation that uses the block cipher AES. Several studies have been conducted to improve the encryption speed using XTS-AES according to the increasing disk size.
Sangwoo An, Seog Chung Seo
doaj   +1 more source

A Note on a CBC-Type Mode of Operation

open access: yesIACR Cryptology ePrint Archive, 2023
. In this paper we formally introduce a novel mode of operation based on the cipher block chaining mode. The main idea of this mode is to use a stateful block cipher instead of a stateless one.
George Teşeleanu
semanticscholar   +1 more source

ACE: ARIA-CTR Encryption for Low-End Embedded Processors

open access: yesSensors, 2020
In this paper, we present the first optimized implementation of ARIA block cipher on low-end 8-bit Alf and Vegard’s RISC processor (AVR) microcontrollers.
Hwajeong Seo   +3 more
doaj   +1 more source

A quantum encryption design featuring confusion, diffusion, and mode of operation

open access: yesScientific Reports, 2021
Quantum cryptography—the application of quantum information processing and quantum computing techniques to cryptography has been extensively investigated.
Zixuan Hu, Sabre Kais
doaj   +1 more source

On the Quantum Security of OCB

open access: yesIACR Transactions on Symmetric Cryptology, 2022
The OCB mode of operation for block ciphers has three variants, OCB1, OCB2 and OCB3. OCB1 and OCB3 can be used as secure authenticated encryption schemes whereas OCB2 has been shown to be classically insecure (Inoue et al., Crypto 2019).
Varun Maram   +3 more
doaj   +1 more source

Patterned Cipher Block for Low-Latency Secure Communication

open access: yesIEEE Access, 2020
Despite the increasing importance of network security, increasing Internet of Things (IoT) uptake and traffic tends to apply tighter resource constraints for cryptography.
Seounghwan Oh   +2 more
doaj   +1 more source

SUNDAE: Small Universal Deterministic Authenticated Encryption for the Internet of Things

open access: yesIACR Transactions on Symmetric Cryptology, 2018
Lightweight cryptography was developed in response to the increasing need to secure devices for the Internet of Things. After significant research effort, many new block ciphers have been designed targeting lightweight settings, optimizing efficiency ...
Subhadeep Banik   +3 more
doaj   +1 more source

Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher

open access: yesIACR Transactions on Symmetric Cryptology, 2020
This paper defines Spook: a sponge-based authenticated encryption with associated data algorithm. It is primarily designed to provide security against side-channel attacks at a low energy cost. For this purpose, Spook is mixing a leakageresistant mode of
Davide Bellizia   +14 more
doaj   +1 more source

Design, Implementation, and Analysis of a Block Cipher Based on a Secure Chaotic Generator

open access: yesApplied Sciences, 2022
This work proposes a new secure chaos-based encryption/decryption system, operating in cipher block chaining (CBC) mode, and analyze its performance. The cryptosystem includes a robust pseudorandom number generator of chaotic sequences (PRNG-CS).
Fethi Dridi   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy