Results 311 to 320 of about 124,770 (378)

Optimizing video data security: A hybrid MAES-ECC encryption technique for efficient internet transmission. [PDF]

open access: yesPLoS One
Shafiq S   +7 more
europepmc   +1 more source

Shadow: A Lightweight Block Cipher for IoT Nodes

IEEE Internet of Things Journal, 2021
The advancement of the Internet of Things (IoT) has promoted the rapid development of low-power and multifunctional sensors. However, it is seriously significant to ensure the security of data transmission of these nodes. Meanwhile, sensor nodes have the
Ying Guo, Lang Li, Botao Liu
semanticscholar   +1 more source

LIZARD - A Lightweight Stream Cipher for Power-constrained Devices

IACR Transactions on Symmetric Cryptology, 2017
Time-memory-data (TMD) tradeoff attacks limit the security level of many classical stream ciphers (like E 0 , A5/1, Trivium, Grain) to 1 / 2 n , where n denotes the inner state length of the underlying keystream generator.
Matthias Hamann   +2 more
semanticscholar   +1 more source

Mercurial Cipher: A New Cipher Technique and Comparative Analysis with Classical Cipher Techniques

2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), 2019
As the world has made significant progress in the science and technology, it has lead to many changes in the day to day life of an individual, both in his behavior and habits. Earlier men use letters, telegram and radio for communication. Today, these communications have been digitized by use of internet technology, mobile phones, online chatting et al.
Rahul Johari   +3 more
openaire   +2 more sources

Ciphers for spies

2001
A spy operating in country X on behalf of country Y has the problem of communicating with his controller in such a way as to protect both himself and the contents of his messages. No matter how he sends his messages they will have to be ‘modified’ somehow so that their true meaning is hidden from anyone but the intended recipient.
openaire   +2 more sources

Block ciphers

2009
A block cipher typically operates on a plaintext which is broken into separate blocks of fixed length. The cipher maps an n bit plaintext to an n bit ciphertext, using a secret key of some fixed size; the mapping function must be invertible, so decryption is accomplished by simply applying the inverse map to the ciphertext.
Pantelimon Stanica, Thomas W. Cusick
openaire   +3 more sources

THE CYLINDER-CIPHER

Cryptologia, 1995
Questions Thomas Jefferson's attributed invention of the “cylinder cipher,” notes similar devices before and after his time, and introduces a “mystery device” of this nature in the National Cryptologic Museum, Fort George G. Meade MD.
openaire   +2 more sources

Protocols of cipher suite

2016 Electric Electronics, Computer Science, Biomedical Engineerings' Meeting (EBBT), 2016
The value of software is proportional to the value of quality. Quality is one of the elements of security. There are two basic concepts that basically contains the security elements it contains. When tested in terms of security software are basically just white-box testing can be used to test the internal structure and may only be used in the user's ...
YEŞİLTEPE, Mirsat   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy