Results 301 to 310 of about 130,132 (369)
Some of the next articles are maybe not open access.
Design of image cipher using block-based scrambling and image filtering
Information Sciences, 2017Zhongyun Hua, Yicong Zhou
exaly +2 more sources
RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms
Science China Information Sciences, 2015Zhenzhen Bao +2 more
exaly +2 more sources
Cryptanalysis of a chaotic image cipher using Latin square-based confusion and diffusion
Nonlinear Dynamics, 2017Di Xiao, Yong Wang
exaly +2 more sources
Shadow: A Lightweight Block Cipher for IoT Nodes
IEEE Internet of Things Journal, 2021The advancement of the Internet of Things (IoT) has promoted the rapid development of low-power and multifunctional sensors. However, it is seriously significant to ensure the security of data transmission of these nodes. Meanwhile, sensor nodes have the
Ying Guo, Lang Li, Botao Liu
semanticscholar +1 more source
FASTA - A Stream Cipher for Fast FHE Evaluation
The Cryptographer's Track at RSA Conference, 2022C. Cid, John Petter Indrøy, H. Raddum
semanticscholar +1 more source
Introduction – A Revolutionary Cipher
2013Cryptology is the science of secret writing. It is made up of two halves; cryptography consists of the techniques for creating systems of secret writing and cryptanalysis encompasses the techniques of breaking them. Over the past 2,500 years, cryptology has developed numerous types of systems to hide messages and subsequently a rich vocabulary in which
openaire +1 more source
WIREs Computational Statistics, 2011
AbstractThis article surveys three of the most widely used ciphers: the symmetric block cipher, Advanced Encryption Standard (AES), the symmetric stream cipher, RC4, and the asymmetric cipher, RSA. WIREs Comp Stat 2011 3 239–250 DOI: 10.1002/wics.156This article is categorized under: Algorithms and Computational Methods > Algorithms Applications of
openaire +1 more source
AbstractThis article surveys three of the most widely used ciphers: the symmetric block cipher, Advanced Encryption Standard (AES), the symmetric stream cipher, RC4, and the asymmetric cipher, RSA. WIREs Comp Stat 2011 3 239–250 DOI: 10.1002/wics.156This article is categorized under: Algorithms and Computational Methods > Algorithms Applications of
openaire +1 more source

