Results 91 to 100 of about 133,735 (361)
On construction of perfect ciphers
K. Shannon in the 40s of the 20th century introduced the concept of a perfect cipher, which provides the best protection of plaintexts. Perfect secrecy means that cryptanalyst can obtain no information about the plaintext by observing the ciphertext.
Sergey M Ratseev
doaj +1 more source
ABSTRACT Background Parents of children treated for acute lymphoblastic leukemia (ALL) often experience significant caregiver burden and disruption to their well‐being. While parent quality of life (QoL) during treatment is well characterized, little is known about outcomes during early survivorship.
Sara Dal Pra +3 more
wiley +1 more source
Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature
In the face of advancing quantum computing capabilities posing significant threats to current cryptographic protocols, the need for post-quantum cryptography has become increasingly urgent.
Filip Opiłka +3 more
doaj +1 more source
Fast software encryption system based on local pseudorandomness [PDF]
New software-oriented single key cryptosystem based on local pseudorandomness is considered. Its cryptorobustness is characterized in probabilistic terms.
A. Moldovyan , N. Moldovyan
doaj
The Rivest Cipher 4 (RC4) has been one of the most popular stream ciphers for providing symmetric key encryption, and is now proposed as an efficient cipher within light-weight cryptography. As an algorithm it has been considered to be one of the fastest
Rahul Saha +4 more
doaj +1 more source
Measurement of Symmetric Cipher on Low Power Devices for Power Grids [PDF]
The symmetric ciphers are often used in low power devices for its low requirements. This article provides a measurement of AES-128 cipher, which should be used for secure communication in power grid (smart grid) networks.
Fujdiak, R.
core
ABSTRACT Purpose Cognitive and psychological difficulties could negatively interfere with treatment adherence and quality of life before and after hematopoietic stem cell transplant (HSCT). Methods to mitigate these changes may have positive effects on treatment success.
Kristen L. Votruba +11 more
wiley +1 more source
We present the new block cipher SHARK. This cipher combines highly non-linear substitution boxes and maximum distance separable error correcting codes (MDS-codes) to guarantee a good diffusion. The cipher is resistant against differential and linear cryptanalysis after a small number of rounds.
Rijmen, Vincent +4 more
openaire +2 more sources
An enriched cryptosystem based Polybius cipher using graph labeling techniques [PDF]
B. Deepa, V. Uma Maheswari
openalex +1 more source
A note on some algebraic trapdoors for block ciphers
We provide sufficient conditions to guarantee that a translation based cipher is not vulnerable with respect to the partition-based trapdoor. This trapdoor has been introduced, recently, by Bannier et al.
Calderini, Marco
core

