Results 1 to 10 of about 128,840 (329)
Modern and Lightweight Component-based Symmetric Cipher Algorithms
Information security, being one of the corner stones of network and communication technology, has been evolving tremendously to cope with the parallel evolution of network security threats.
Samar A. Qassir +2 more
doaj +3 more sources
GPT-4 Is Too Smart To Be Safe: Stealthy Chat with LLMs via Cipher [PDF]
Safety lies at the core of the development of Large Language Models (LLMs). There is ample work on aligning LLMs with human ethics and preferences, including data filtering in pretraining, supervised fine-tuning, reinforcement learning from human ...
Youliang Yuan +6 more
semanticscholar +1 more source
One round cipher algorithm for multimedia IoT devices
Ali Chehab +2 more
exaly +2 more sources
Chaghri - A FHE-friendly Block Cipher
The Recent progress in practical applications of secure computation protocols has also attracted attention to the symmetric-key primitives underlying them.
T. Ashur, M. Mahzoun, Dilara Toprakhisar
semanticscholar +1 more source
Background Variants identified through parent–child trio-WES yield up to 28–55% positive diagnostic rate across a variety of Mendelian disorders, there remain numerous patients who do not receive a genetic diagnosis.
Qiang Li +5 more
doaj +1 more source
Background X‐linked lymphoproliferative syndrome type 1 (XLP1) is a rare primary immunodeficiency disorder characterized by severe immune dysregulation often after viral infection. It is caused by hemizygous mutations in the X‐linked SH2D1A gene.
Liwen Wu +5 more
doaj +1 more source
Hundreds of image encryption schemes have been conducted (as the literature review indicates). The majority of these schemes use pixels as building blocks for confusion and diffusion operations.
Muhammad Hanif +8 more
doaj +1 more source
We introduce SPEEDY, a family of ultra low-latency block ciphers. We mix engineering expertise into each step of the cipher’s design process in order to create a secure encryption primitive with an extremely low latency in CMOS hardware.
G. Leander +3 more
semanticscholar +1 more source
A New Random Keys Generator Depend on Multi Techniques [PDF]
A stream cipher is a symmetric cipher which operates with a time-varying transformation onIndividual plaintext digits. By contrast, block ciphers operate with a fixed transformation on large blocks of plaintext digits.
Alaa kadhim, Hussein Abed
doaj +1 more source
New Technique using Fibonacci Matrices with Play-Fair System in Cryptography
In this paper we introduce a new Technique, this technique depends on the Fibonacci sequence and Fibonacci Matrices with a Play- Fair which is one of the cryptography systems.
Awni M.Gaftan +2 more
doaj +1 more source

