Results 91 to 100 of about 133,735 (361)

On construction of perfect ciphers

open access: yesVestnik Samarskogo Gosudarstvennogo Tehničeskogo Universiteta. Seriâ: Fiziko-Matematičeskie Nauki, 2014
K. Shannon in the 40s of the 20th century introduced the concept of a perfect cipher, which provides the best protection of plaintexts. Perfect secrecy means that cryptanalyst can obtain no information about the plaintext by observing the ciphertext.
Sergey M Ratseev
doaj   +1 more source

Parent Quality of Life at Two Years Following Their Child's Completion of Acute Lymphoblastic Leukemia Treatment

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Parents of children treated for acute lymphoblastic leukemia (ALL) often experience significant caregiver burden and disruption to their well‐being. While parent quality of life (QoL) during treatment is well characterized, little is known about outcomes during early survivorship.
Sara Dal Pra   +3 more
wiley   +1 more source

Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature

open access: yesApplied Sciences
In the face of advancing quantum computing capabilities posing significant threats to current cryptographic protocols, the need for post-quantum cryptography has become increasingly urgent.
Filip Opiłka   +3 more
doaj   +1 more source

Fast software encryption system based on local pseudorandomness [PDF]

open access: yesComputer Science Journal of Moldova, 1996
New software-oriented single key cryptosystem based on local pseudorandomness is considered. Its cryptorobustness is characterized in probabilistic terms.
A. Moldovyan , N. Moldovyan
doaj  

MRC4: A Modified RC4 Algorithm Using Symmetric Random Function Generator for Improved Cryptographic Features

open access: yesIEEE Access, 2019
The Rivest Cipher 4 (RC4) has been one of the most popular stream ciphers for providing symmetric key encryption, and is now proposed as an efficient cipher within light-weight cryptography. As an algorithm it has been considered to be one of the fastest
Rahul Saha   +4 more
doaj   +1 more source

Measurement of Symmetric Cipher on Low Power Devices for Power Grids [PDF]

open access: yes, 2015
The symmetric ciphers are often used in low power devices for its low requirements. This article provides a measurement of AES-128 cipher, which should be used for secure communication in power grid (smart grid) networks.
Fujdiak, R.
core  

Cognitive Functioning in Vorinostat‐Treated Pediatric and Young Adult Patients Over the First 180 Days After Hematopoietic Stem Cell Transplant

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Cognitive and psychological difficulties could negatively interfere with treatment adherence and quality of life before and after hematopoietic stem cell transplant (HSCT). Methods to mitigate these changes may have positive effects on treatment success.
Kristen L. Votruba   +11 more
wiley   +1 more source

The cipher SHARK [PDF]

open access: yes, 1996
We present the new block cipher SHARK. This cipher combines highly non-linear substitution boxes and maximum distance separable error correcting codes (MDS-codes) to guarantee a good diffusion. The cipher is resistant against differential and linear cryptanalysis after a small number of rounds.
Rijmen, Vincent   +4 more
openaire   +2 more sources

A note on some algebraic trapdoors for block ciphers

open access: yes, 2018
We provide sufficient conditions to guarantee that a translation based cipher is not vulnerable with respect to the partition-based trapdoor. This trapdoor has been introduced, recently, by Bannier et al.
Calderini, Marco
core  

Home - About - Disclaimer - Privacy