Results 31 to 40 of about 20,803 (281)

Elastic block ciphers

open access: yesProceedings of the 2nd ACM symposium on Information, computer and communications security, 2007
We introduce the concept of an elastic block cipher, which refers to stretching the supported block size of a block cipher to any length up to twice the original block size while incurring a computational workload that is proportional to the block size. We define a method for converting any existing block cipher into an elastic block cipher and mention
Cook, Debra L.   +2 more
openaire   +2 more sources

KOMBINASI CAESAR CIPHER DAN REVERSE CIPHER BERDASARKAN CIPHER BLOCK CHAINING

open access: yesMajalah Ilmiah Matematika dan Statistika, 2021
Communication in the current era of globalization is very developed. Many applications that can be used to facilitate communication. However, because of this convenience, the security of the information contained in it will be more easily hacked by irresponsible people. Cryptography is the science or art for security message.
Maulidyah Lailatun Najah   +1 more
openaire   +2 more sources

The New Block Cipher Design (Tigris Cipher) [PDF]

open access: yesInternational Journal of Computer Network and Information Security, 2015
Abstract—In the present paper we have proposed a new variant of AES cipher with high level of security and an elegant construction called TIGRIS cipher. The TIGRIS name has been derived from one of the two famous rivers in Iraq. The proposed TIGRIS cipher is a revision for the proposed Euphrates cipher which has already been published.
Omar A. Dawood   +2 more
openaire   +1 more source

A Review of Block Cipher’s S-Boxes Tests Criteria [PDF]

open access: yesالمجلة العراقية للعلوم الاحصائية, 2019
The Symmetric Block cipher is a considerable encryption algorithm because of its straightforwardness, rapidity and strength and this cryptographic algorithm is employed in carrying out the encryption and decryption for most current security applications.
Auday H. Saeed AL-Wattar
doaj   +1 more source

A dynamical systems approach to the discrimination of the modes of operation of cryptographic systems

open access: yes, 2015
Evidence of signatures associated with cryptographic modes of operation is established. Motivated by some analogies between cryptographic and dynamical systems, in particular with chaos theory, we propose an algorithm based on Lyapunov exponents of ...
Baetens, Jan M.   +4 more
core   +1 more source

One to One Identification of Cryptosystem Using Fisher’s Discriminant Analysis

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2018
Distiguishing analysis is an important part of cryptanalysis. It is an important content of discriminating analysis that how to identify ciphertext is encrypted by which cryptosystems when it knows only ciphertext.
Xinyi Hu, Yaqun Zhao
doaj   +1 more source

Systematization of a 256-bit lightweight block cipher Marvin [PDF]

open access: yes, 2018
In a world heavily loaded by information, there is a great need for keeping specific information secure from adversaries. The rapid growth in the research field of lightweight cryptography can be seen from the list of the number of lightweight stream as ...
Bhattacharya, Abhishek   +2 more
core   +1 more source

Exploring Energy Efficiency of Lightweight Block Ciphers [PDF]

open access: yes, 2015
. In the last few years, the field of lightweight cryptography has seen an influx in the number of block ciphers and hash functions being proposed. One of the metrics that define a good lightweight design is the energy consumed per unit operation of the ...
Banik, Subhadeep   +2 more
core   +2 more sources

European Standard Clinical Practice Guideline and EXPeRT Recommendations for the Diagnosis and Management of Gastroenteropancreatic Neuroendocrine Neoplasms in Children and Adolescents

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Pediatric gastroenteropancreatic neuroendocrine neoplasms (GEP‐NENs) are extremely rare and clinically heterogeneous. Management has largely been extrapolated from adult practice. This European Standard Clinical Practice Guideline (ESCP), developed by the EXPeRT network in collaboration with adult NEN experts, provides (adult) evidence ...
Michaela Kuhlen   +23 more
wiley   +1 more source

Dynamic MDS Matrices for Substantial Cryptographic Strength [PDF]

open access: yes, 2011
Ciphers get their strength from the mathematical functions of confusion and diffusion, also known as substitution and permutation. These were the basics of classical cryptography and they are still the basic part of modern ciphers.
Malik, Muhammad Yasir, No, Jong-Seon
core   +2 more sources

Home - About - Disclaimer - Privacy