Results 11 to 20 of about 133,735 (361)
The Subterranean 2.0 Cipher Suite
This paper presents the Subterranean 2.0 cipher suite that can be used for hashing, MAC computation, stream encryption and several types of authenticated encryption schemes. At its core it has a duplex object with a 257-bit state and a lightweight single-
J. Daemen +3 more
semanticscholar +1 more source
Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher [PDF]
In ISNN'04, a novel symmetric cipher was proposed, by combining a chaotic signal and a clipped neural network (CNN) for encryption. The present paper analyzes the security of this chaotic cipher against chosen-plaintext attacks, and points out that this ...
B. Schneier +5 more
core +5 more sources
Two-Layer Security Algorithms to Prevent Attacks on Data in Cyberspace
The ratio at which the number of users is increasing in cloud computing, the same as the number of data destruction, has doubled. Various algorithms have been designed to secure cloud servers to prevent an attacker from attacking, but they cannot protect
Muhammad Nadeem +7 more
doaj +1 more source
SLIM: A Lightweight Block Cipher for Internet of Health Things
Nowadays, there is a strong demand for increasing the protection of resource-constrained devices such as Radio frequency identification (RFID) systems. Current cryptographic algorithms are sufficient for high-resource desktop computers.
Bassam Aboushosha +4 more
semanticscholar +1 more source
Deciphering a novel image cipher based on mixed transformed Logistic maps [PDF]
Since John von Neumann suggested utilizing Logistic map as a random number generator in 1947, a great number of encryption schemes based on Logistic map and/or its variants have been proposed. This paper re-evaluates the security of an image cipher based
Cheng, Ge +4 more
core +1 more source
DOI: 10.17014/ijog.3.1.29-51Stratified sampling of coal seams for petrographic analysis using block samples is a viable alternative to standard methods of channel sampling and particulate pellet mounts.
Tim A. Moore
doaj +1 more source
Summary: In order to protect both data confidentiality and legality, a concept of a watermarking cipher (also called a w-cipher) is defined. The main idea of this cjncept is as follows: the transformation of a plaintext \(x\) by the composition of encryption and decryption operations using some encryption and decryption keys yields a proper text \(x ...
openaire +5 more sources
How to distinguish between a block cipher and a random permutation by lowering the input entropy [PDF]
IEEE 35th International Carnahan Conference on Security Technology. Londres, 16-19 October 2001A novel cryptanalysis technique is presented, and its suitability for distinguishing a block cipher algorithm or a hash function from a random permutation is ...
González-Tablas, Ana Isabel +3 more
core +3 more sources
LSB STEGANO PADA KOMBINASI KRITPOGRAFI SIMETRIS CAESAR-VIGENERE
Dalam perkembangan teknologi komunikasi data, dan banyaknya problem mengenai manipulasi data maka perlu tindak lanjut mengenai teknik untuk mengamankan data.
Ibnu Utomo Wahyu Mulyono +2 more
doaj +1 more source
Нотный текст загадочных канонов: код или шифр?
Предметом изучения в статье выступает феномен музыкального кода, который рассматривается на материале произведений, относящихся к особому жанру старинной музыки -загадочным канонам. Автор рассматривает код как необходимое условие музыкальной коммуникации,
Юферова, Ольга Александровна
doaj +1 more source

