Results 21 to 30 of about 130,132 (369)
How to distinguish between a block cipher and a random permutation by lowering the input entropy [PDF]
IEEE 35th International Carnahan Conference on Security Technology. Londres, 16-19 October 2001A novel cryptanalysis technique is presented, and its suitability for distinguishing a block cipher algorithm or a hash function from a random permutation is ...
González-Tablas, Ana Isabel +3 more
core +3 more sources
Нотный текст загадочных канонов: код или шифр?
Предметом изучения в статье выступает феномен музыкального кода, который рассматривается на материале произведений, относящихся к особому жанру старинной музыки -загадочным канонам. Автор рассматривает код как необходимое условие музыкальной коммуникации,
Юферова, Ольга Александровна
doaj +1 more source
MV3: A new word based stream cipher using rapid mixing and revolving buffers [PDF]
MV3 is a new word based stream cipher for encrypting long streams of data. A direct adaptation of a byte based cipher such as RC4 into a 32- or 64-bit word version will obviously need vast amounts of memory. This scaling issue necessitates a look for new
A. Biryukov +14 more
core +3 more sources
Privacy Protection Based on Stream Cipher for Spatiotemporal Data in IoT
In the participatory sensing framework, privacy protection of the Internet of Things (IoT) is very important. In this article, cryptography-based methods are utilized to protect participants’ privacy information in unsecured network channels for dynamic ...
Tianen Liu +5 more
semanticscholar +1 more source
The most serious challenges currently faced by healthcare environment is the decision making related to the installation of the most suitable and appropriate lightweight authentication cipher that could provide solutions towards the authentication issues
Liao Ning +4 more
semanticscholar +1 more source
Proposal to Complex DES Security Using Diffie Hellman Injection [PDF]
Data Encryption Standard (DES) is based on a round of starters, from the results of the use of multi-stage permutation and replacement to the more complex algorithm which adopts the symmetric key.
Shatha habeeb Jafar
doaj +1 more source
Summary: In order to protect both data confidentiality and legality, a concept of a watermarking cipher (also called a w-cipher) is defined. The main idea of this cjncept is as follows: the transformation of a plaintext \(x\) by the composition of encryption and decryption operations using some encryption and decryption keys yields a proper text \(x ...
openaire +5 more sources
CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks
Traditionally, countermeasures against physical attacks are integrated into the implementation of cryptographic primitives after the algorithms have been designed for achieving a certain level of cryptanalytic security.
Christof Beierle +3 more
semanticscholar +1 more source
The Internet plays an essential role in modern societies and in the amount of sensitive data transported over the optical networks that shows its' importance has increased drastically.
F. Futami, K. Tanizawa, Kentaro Kato
semanticscholar +1 more source
VG1 Cipher – A DNA Indexing Cipher
When it comes to providing security to information systems, encryption emerges as an indispensable tool, as it has been used intensively in past few decades for securing stationary data as well as data in motion. Earlier, the security of an encryption algorithm lied in the manipulation of characters among a word or group of words, which is called the ...
Akhil Kaushik*, Dr. Vikas Thada
openaire +1 more source

