Results 1 to 10 of about 57,695 (382)
Security amplification by composition: The case of doubly-iterated, ideal ciphers [PDF]
arXiv, 1998We investigate, in the Shannon model, the security of constructions corresponding to double and (two-key) triple DES. That is, we consider F_{k1}(F_{k2}(.)) and F_{k1}(F_{k2}^{-1}(F_{k1}(.))) with the component functions being ideal ciphers. This models the resistance of these constructions to ``generic'' attacks like meet in the middle attacks.
William Aiello+3 more
arxiv +5 more sources
The Subterranean 2.0 Cipher Suite [PDF]
IACR Transactions on Symmetric Cryptology, 2020This paper presents the Subterranean 2.0 cipher suite that can be used for hashing, MAC computation, stream encryption and several types of authenticated encryption schemes. At its core it has a duplex object with a 257-bit state and a lightweight single-
J. Daemen+3 more
semanticscholar +9 more sources
Perfectly secure cipher system [PDF]
arXiv, 2000We present a perfectly secure cipher system based on the concept of fake bits which has never been used in either classical or quantum cryptography.
Arindam Mitra
arxiv +3 more sources
Journal of Lightwave Technology, 2020
The Internet plays an essential role in modern societies and in the amount of sensitive data transported over the optical networks that shows its' importance has increased drastically.
Fumio Futami+2 more
exaly +2 more sources
The Internet plays an essential role in modern societies and in the amount of sensitive data transported over the optical networks that shows its' importance has increased drastically.
Fumio Futami+2 more
exaly +2 more sources
KOMBINASI CAESAR CIPHER DAN REVERSE CIPHER BERDASARKAN CIPHER BLOCK CHAINING
Majalah Ilmiah Matematika dan Statistika, 2021Communication in the current era of globalization is very developed. Many applications that can be used to facilitate communication. However, because of this convenience, the security of the information contained in it will be more easily hacked by ...
Maulidyah Lailatun Najah+1 more
doaj +3 more sources
GPT-4 Is Too Smart To Be Safe: Stealthy Chat with LLMs via Cipher [PDF]
International Conference on Learning Representations, 2023Safety lies at the core of the development of Large Language Models (LLMs). There is ample work on aligning LLMs with human ethics and preferences, including data filtering in pretraining, supervised fine-tuning, reinforcement learning from human ...
Youliang Yuan+6 more
semanticscholar +1 more source
IACR Cryptology ePrint Archive, 2021
We introduce SPEEDY, a family of ultra low-latency block ciphers. We mix engineering expertise into each step of the cipher’s design process in order to create a secure encryption primitive with an extremely low latency in CMOS hardware.
G. Leander+3 more
semanticscholar +1 more source
We introduce SPEEDY, a family of ultra low-latency block ciphers. We mix engineering expertise into each step of the cipher’s design process in order to create a secure encryption primitive with an extremely low latency in CMOS hardware.
G. Leander+3 more
semanticscholar +1 more source
BMC Medical Genomics, 2021
Background Variants identified through parent–child trio-WES yield up to 28–55% positive diagnostic rate across a variety of Mendelian disorders, there remain numerous patients who do not receive a genetic diagnosis.
Qiang Li+5 more
doaj +1 more source
Background Variants identified through parent–child trio-WES yield up to 28–55% positive diagnostic rate across a variety of Mendelian disorders, there remain numerous patients who do not receive a genetic diagnosis.
Qiang Li+5 more
doaj +1 more source
Molecular Genetics & Genomic Medicine, 2022
Background X‐linked lymphoproliferative syndrome type 1 (XLP1) is a rare primary immunodeficiency disorder characterized by severe immune dysregulation often after viral infection. It is caused by hemizygous mutations in the X‐linked SH2D1A gene.
Liwen Wu+5 more
doaj +1 more source
Background X‐linked lymphoproliferative syndrome type 1 (XLP1) is a rare primary immunodeficiency disorder characterized by severe immune dysregulation often after viral infection. It is caused by hemizygous mutations in the X‐linked SH2D1A gene.
Liwen Wu+5 more
doaj +1 more source
Designs, Codes and Cryptography, 2015
International ...
Boura, Christina+3 more
openaire +7 more sources
International ...
Boura, Christina+3 more
openaire +7 more sources