Results 31 to 40 of about 133,735 (361)

FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher

open access: yesSensors, 2019
Security of sensitive data exchanged between devices is essential. Low-resource devices (LRDs), designed for constrained environments, are increasingly becoming ubiquitous.
Sa’ed Abed   +3 more
doaj   +1 more source

The QARMA Block Cipher Family. Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes

open access: yesIACR Transactions on Symmetric Cryptology, 2017
This paper introduces QARMA, a new family of lightweight tweakable block ciphers targeted at applications such as memory encryption, the generation of very short tags for hardware-assisted prevention of software exploitation, and the construction of ...
R. Avanzi
semanticscholar   +1 more source

Cows, clicks, ciphers, and satire

open access: yesNECSUS, 2015
The social network game Farmville, which allows players to grow crops, raise animals, and produce a variety of goods, proved enormously successful within a year of its launch in 2009, attracting 110 million Facebook users.
Tom Tyler
doaj   +1 more source

«The black room» the Russian foreign Ministry against Napoleon

open access: yesVestnik MGIMO-Universiteta, 2012
This article deals with the successful activity of the Russian Empire cryptographers against Napoleon and his troops. Also some organizational work aspects of interception of French army cipher messages are considered.
D. E. Larin
doaj   +1 more source

A novel H.264 SVC encryption scheme for secure bit-rate transcoding [PDF]

open access: yes, 2009
This paper presents a novel architecture for the secure delivery of encrypted H.264 SVC bitstreams. It relies on a block cipher and stream cipher used in a novel way that would allow an intermediary transcoder to truncate the bitstream to the appropriate
Bull, DR, Redmill, DW, Thomas, NM
core   +2 more sources

Authentication of data hiding using co-occurrence matrix [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2012
This research is considered one of the steps aiming to deal with one of the most important challenges facing communicators via Internet, as a means for ensuring information security and verifying the authenticity and credibility of the received message ...
Melad saeed, Ghada thanoon
doaj   +1 more source

The Importance of Creativity in the Sportification of Breakdance

open access: yesFrontiers in Education, 2022
Many historical works have attempted to reveal the process of the sportification of physical activity that originated in the eighteenth century. The process of sportification can be divided into three basic mechanisms: The institutionalization of ...
Zhi Yang, YuJie Bai, MingTao Wei
doaj   +1 more source

A New Type of Cipher: DICING_csb [PDF]

open access: yes, 2007
In this paper, we will propose a new type of cipher named DICING_csb, which is derived from our previous stream cipher DICING. It has applied a stream of subkey and an encryption form of block ciphers, so it may be viewed as a combinative of stream ...
Li, An-Ping
core   +2 more sources

The HIT Network for Children and Adolescents With CNS Tumors Facilitates Improvements of Diagnostic Assessments, Multimodal Treatments, Individual Counseling, and Research in Germany, Austria, and Switzerland

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background The HIT network was established in 2000 to create a population‐based structure aiming to improve survival rates and reduce late effects for children with central nervous system (CNS) tumors by conducting comprehensive clinical trials.
Stefan Rutkowski   +59 more
wiley   +1 more source

Using of tiny encryption algorithm in CAN-Bus communication

open access: yesResearch in Agricultural Engineering, 2016
The rising costs of agriculture machine operation force manufacturers to look for solutions that simplify the machine operation to its users and increase user comfort.
M. Jukl, J. Čupera
doaj   +1 more source

Home - About - Disclaimer - Privacy