Results 11 to 20 of about 87,772 (336)
Stream cipher based on quasigroup string transformations in $Z_p^*$
In this paper we design a stream cipher that uses the algebraic structure of the multiplicative group $\bbbz_p^*$ (where p is a big prime number used in ElGamal algorithm), by defining a quasigroup of order $p-1$ and by doing quasigroup string ...
Gligoroski, Danilo
core +4 more sources
Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher [PDF]
In ISNN'04, a novel symmetric cipher was proposed, by combining a chaotic signal and a clipped neural network (CNN) for encryption. The present paper analyzes the security of this chaotic cipher against chosen-plaintext attacks, and points out that this ...
B. Schneier+5 more
core +5 more sources
Deciphering a novel image cipher based on mixed transformed Logistic maps [PDF]
Since John von Neumann suggested utilizing Logistic map as a random number generator in 1947, a great number of encryption schemes based on Logistic map and/or its variants have been proposed. This paper re-evaluates the security of an image cipher based
Cheng, Ge+4 more
core +1 more source
DOI: 10.17014/ijog.3.1.29-51Stratified sampling of coal seams for petrographic analysis using block samples is a viable alternative to standard methods of channel sampling and particulate pellet mounts.
Tim A. Moore
doaj +1 more source
How to distinguish between a block cipher and a random permutation by lowering the input entropy [PDF]
IEEE 35th International Carnahan Conference on Security Technology. Londres, 16-19 October 2001A novel cryptanalysis technique is presented, and its suitability for distinguishing a block cipher algorithm or a hash function from a random permutation is ...
González-Tablas, Ana Isabel+3 more
core +3 more sources
Нотный текст загадочных канонов: код или шифр?
Предметом изучения в статье выступает феномен музыкального кода, который рассматривается на материале произведений, относящихся к особому жанру старинной музыки -загадочным канонам. Автор рассматривает код как необходимое условие музыкальной коммуникации,
Юферова, Ольга Александровна
doaj +1 more source
MV3: A new word based stream cipher using rapid mixing and revolving buffers [PDF]
MV3 is a new word based stream cipher for encrypting long streams of data. A direct adaptation of a byte based cipher such as RC4 into a 32- or 64-bit word version will obviously need vast amounts of memory. This scaling issue necessitates a look for new
A. Biryukov+14 more
core +3 more sources
Proposal to Complex DES Security Using Diffie Hellman Injection [PDF]
Data Encryption Standard (DES) is based on a round of starters, from the results of the use of multi-stage permutation and replacement to the more complex algorithm which adopts the symmetric key.
Shatha habeeb Jafar
doaj +1 more source
The New Block Cipher Design (Tigris Cipher) [PDF]
Abstract—In the present paper we have proposed a new variant of AES cipher with high level of security and an elegant construction called TIGRIS cipher. The TIGRIS name has been derived from one of the two famous rivers in Iraq. The proposed TIGRIS cipher is a revision for the proposed Euphrates cipher which has already been published.
Abdul Monem S. Rahma+2 more
openaire +1 more source
Using of tiny encryption algorithm in CAN-Bus communication
The rising costs of agriculture machine operation force manufacturers to look for solutions that simplify the machine operation to its users and increase user comfort.
M. Jukl, J. Čupera
doaj +1 more source