Results 311 to 320 of about 124,770 (378)
A Novel One-Dimensional Chaotic System for Image Encryption in Network Transmission Through Base64 Encoding. [PDF]
Huang L+5 more
europepmc +1 more source
Optimizing video data security: A hybrid MAES-ECC encryption technique for efficient internet transmission. [PDF]
Shafiq S+7 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Shadow: A Lightweight Block Cipher for IoT Nodes
IEEE Internet of Things Journal, 2021The advancement of the Internet of Things (IoT) has promoted the rapid development of low-power and multifunctional sensors. However, it is seriously significant to ensure the security of data transmission of these nodes. Meanwhile, sensor nodes have the
Ying Guo, Lang Li, Botao Liu
semanticscholar +1 more source
LIZARD - A Lightweight Stream Cipher for Power-constrained Devices
IACR Transactions on Symmetric Cryptology, 2017Time-memory-data (TMD) tradeoff attacks limit the security level of many classical stream ciphers (like E 0 , A5/1, Trivium, Grain) to 1 / 2 n , where n denotes the inner state length of the underlying keystream generator.
Matthias Hamann+2 more
semanticscholar +1 more source
Mercurial Cipher: A New Cipher Technique and Comparative Analysis with Classical Cipher Techniques
2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), 2019As the world has made significant progress in the science and technology, it has lead to many changes in the day to day life of an individual, both in his behavior and habits. Earlier men use letters, telegram and radio for communication. Today, these communications have been digitized by use of internet technology, mobile phones, online chatting et al.
Rahul Johari+3 more
openaire +2 more sources
2001
A spy operating in country X on behalf of country Y has the problem of communicating with his controller in such a way as to protect both himself and the contents of his messages. No matter how he sends his messages they will have to be ‘modified’ somehow so that their true meaning is hidden from anyone but the intended recipient.
openaire +2 more sources
A spy operating in country X on behalf of country Y has the problem of communicating with his controller in such a way as to protect both himself and the contents of his messages. No matter how he sends his messages they will have to be ‘modified’ somehow so that their true meaning is hidden from anyone but the intended recipient.
openaire +2 more sources
2009
A block cipher typically operates on a plaintext which is broken into separate blocks of fixed length. The cipher maps an n bit plaintext to an n bit ciphertext, using a secret key of some fixed size; the mapping function must be invertible, so decryption is accomplished by simply applying the inverse map to the ciphertext.
Pantelimon Stanica, Thomas W. Cusick
openaire +3 more sources
A block cipher typically operates on a plaintext which is broken into separate blocks of fixed length. The cipher maps an n bit plaintext to an n bit ciphertext, using a secret key of some fixed size; the mapping function must be invertible, so decryption is accomplished by simply applying the inverse map to the ciphertext.
Pantelimon Stanica, Thomas W. Cusick
openaire +3 more sources
Cryptologia, 1995
Questions Thomas Jefferson's attributed invention of the “cylinder cipher,” notes similar devices before and after his time, and introduces a “mystery device” of this nature in the National Cryptologic Museum, Fort George G. Meade MD.
openaire +2 more sources
Questions Thomas Jefferson's attributed invention of the “cylinder cipher,” notes similar devices before and after his time, and introduces a “mystery device” of this nature in the National Cryptologic Museum, Fort George G. Meade MD.
openaire +2 more sources
2016 Electric Electronics, Computer Science, Biomedical Engineerings' Meeting (EBBT), 2016
The value of software is proportional to the value of quality. Quality is one of the elements of security. There are two basic concepts that basically contains the security elements it contains. When tested in terms of security software are basically just white-box testing can be used to test the internal structure and may only be used in the user's ...
YEŞİLTEPE, Mirsat+2 more
openaire +3 more sources
The value of software is proportional to the value of quality. Quality is one of the elements of security. There are two basic concepts that basically contains the security elements it contains. When tested in terms of security software are basically just white-box testing can be used to test the internal structure and may only be used in the user's ...
YEŞİLTEPE, Mirsat+2 more
openaire +3 more sources