Results 1 to 10 of about 87,772 (336)

FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher

open access: yesSensors, 2019
Security of sensitive data exchanged between devices is essential. Low-resource devices (LRDs), designed for constrained environments, are increasingly becoming ubiquitous.
Sa'ed Abed   +2 more
exaly   +3 more sources

Unraveling synonymous and deep intronic variants causing aberrant splicing in two genetically undiagnosed epilepsy families

open access: yesBMC Medical Genomics, 2021
Background Variants identified through parent–child trio-WES yield up to 28–55% positive diagnostic rate across a variety of Mendelian disorders, there remain numerous patients who do not receive a genetic diagnosis.
Qiang Li   +5 more
doaj   +1 more source

Exon skipping caused by a complex structural variation in SH2D1A resulted in X‐linked lymphoproliferative syndrome type 1

open access: yesMolecular Genetics & Genomic Medicine, 2022
Background X‐linked lymphoproliferative syndrome type 1 (XLP1) is a rare primary immunodeficiency disorder characterized by severe immune dysregulation often after viral infection. It is caused by hemizygous mutations in the X‐linked SH2D1A gene.
Liwen Wu   +5 more
doaj   +1 more source

A Novel Grayscale Image Encryption Scheme Based on the Block-Level Swapping of Pixels and the Chaotic System

open access: yesSensors, 2022
Hundreds of image encryption schemes have been conducted (as the literature review indicates). The majority of these schemes use pixels as building blocks for confusion and diffusion operations.
Muhammad Hanif   +8 more
doaj   +1 more source

Reflection ciphers [PDF]

open access: yesDesigns, Codes and Cryptography, 2015
This paper investigates ciphers where the set of encryption functions is identical to the set of decryption functions, which we call reflection ciphers. Equivalently, there exists a permutation P, named the coupling permutation, such that decryption under k corresponds to encryption under P(k).
Boura, Christina   +3 more
openaire   +5 more sources

A New Random Keys Generator Depend on Multi Techniques [PDF]

open access: yesEngineering and Technology Journal, 2015
A stream cipher is a symmetric cipher which operates with a time-varying transformation onIndividual plaintext digits. By contrast, block ciphers operate with a fixed transformation on large blocks of plaintext digits.
Alaa kadhim, Hussein Abed
doaj   +1 more source

Two-Layer Security Algorithms to Prevent Attacks on Data in Cyberspace

open access: yesApplied Sciences, 2022
The ratio at which the number of users is increasing in cloud computing, the same as the number of data destruction, has doubled. Various algorithms have been designed to secure cloud servers to prevent an attacker from attacking, but they cannot protect
Muhammad Nadeem   +7 more
doaj   +1 more source

KOMBINASI CAESAR CIPHER DAN REVERSE CIPHER BERDASARKAN CIPHER BLOCK CHAINING

open access: yesMajalah Ilmiah Matematika dan Statistika, 2021
Communication in the current era of globalization is very developed. Many applications that can be used to facilitate communication. However, because of this convenience, the security of the information contained in it will be more easily hacked by irresponsible people. Cryptography is the science or art for security message.
Maulidyah Lailatun Najah   +1 more
openaire   +3 more sources

New Technique using Fibonacci Matrices with Play-Fair System in Cryptography

open access: yesTikrit Journal of Pure Science, 2022
In this paper we introduce a new Technique, this technique depends on the Fibonacci sequence and Fibonacci Matrices with a Play- Fair which is one of the cryptography systems.
Awni M.Gaftan   +2 more
doaj   +1 more source

Evolusi Cipher Vigenere dalam Peningkatan Pengamanan Informasi

open access: yesJurnal informatika UPGRIS, 2021
Pertukaran informasi melalui ruang publik masih menyisakan kerentanan keamanan, sehingga perlu mekanisme pengamanan melalui proses kriptografi. Salah satu model kriptografi yang dapat bertahan hingga lebih dari 300 tahun adalah Vigenere Cipher, sebelum ...
Eka Ardhianto   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy