Results 1 to 10 of about 116,559 (398)
Security amplification by composition: The case of doubly-iterated, ideal ciphers [PDF]
We investigate, in the Shannon model, the security of constructions corresponding to double and (two-key) triple DES. That is, we consider F_{k1}(F_{k2}(.)) and F_{k1}(F_{k2}^{-1}(F_{k1}(.))) with the component functions being ideal ciphers. This models the resistance of these constructions to ``generic'' attacks like meet in the middle attacks.
William Aiello+3 more
arxiv +5 more sources
A Complex Transformation of Monoalphabetic Cipher to Polyalphabetic Cipher: (Vigenère-Affine Cipher) [PDF]
Fast progression of digital data exchange in electronic way, information security is becoming much more important in data storage and transmission on public communication networks.
Tun Myat Aung, Htet Naing, Ni Ni Hla
semanticscholar +3 more sources
Perfectly secure cipher system [PDF]
We present a perfectly secure cipher system based on the concept of fake bits which has never been used in either classical or quantum cryptography.
Arindam Mitra
arxiv +3 more sources
The Internet plays an essential role in modern societies and in the amount of sensitive data transported over the optical networks that shows its' importance has increased drastically.
Fumio Futami+2 more
exaly +2 more sources
A family of trapdoor ciphers [PDF]
This paper presents several methods to construct trapdoor block ciphers. A trapdoor cipher contains some hidden structure; knowledge of this structure allows an attacker to obtain information on the key or to decrypt certain ciphertexts. Without this trapdoor information the block cipher seems to be secure.
Vincent Rijmen, Bart Preneel
openalex +4 more sources
GPT-4 Is Too Smart To Be Safe: Stealthy Chat with LLMs via Cipher [PDF]
Safety lies at the core of the development of Large Language Models (LLMs). There is ample work on aligning LLMs with human ethics and preferences, including data filtering in pretraining, supervised fine-tuning, reinforcement learning from human ...
Youliang Yuan+6 more
semanticscholar +1 more source
We introduce SPEEDY, a family of ultra low-latency block ciphers. We mix engineering expertise into each step of the cipher’s design process in order to create a secure encryption primitive with an extremely low latency in CMOS hardware.
G. Leander+3 more
semanticscholar +1 more source
Background Variants identified through parent–child trio-WES yield up to 28–55% positive diagnostic rate across a variety of Mendelian disorders, there remain numerous patients who do not receive a genetic diagnosis.
Qiang Li+5 more
doaj +1 more source
Background X‐linked lymphoproliferative syndrome type 1 (XLP1) is a rare primary immunodeficiency disorder characterized by severe immune dysregulation often after viral infection. It is caused by hemizygous mutations in the X‐linked SH2D1A gene.
Liwen Wu+5 more
doaj +1 more source
This paper investigates ciphers where the set of encryption functions is identical to the set of decryption functions, which we call reflection ciphers. Equivalently, there exists a permutation P, named the coupling permutation, such that decryption under k corresponds to encryption under P(k).
Boura, Christina+3 more
openaire +6 more sources