Search

Showing total 1,132 results

Search Constraints

Start Over You searched for: Topic ciphers Remove constraint Topic: ciphers Publication Year Range Last 50 years Remove constraint Publication Year Range: Last 50 years Database Academic Search Index Remove constraint Database: Academic Search Index
1,132 results

Search Results

1. All-printed semiquantitative paper-based analytical devices relying on QR code array readout.

2. A Compact Implementation of Shadow on an IoT Processor.

3. Key cypher detection using genetic algorithms and symmetric key.

4. XOR Vector Space based S-Box generation and its Application to DES and AES for the Time-Efficient Image Encryption.

5. Parallel Search Using Probabilistic DNA Sticker Model to Cryptanyze One Time Pad Polyalphabetic Cipher.

6. Low area and high throughput hardware implementations for the LILLIPUT cipher.

7. Cryptanalyzing an Image Encryption Scheme Using Synchronization of Memristor Chaotic Systems.

8. Leo Marks' "mental one-time pad": an experimental cipher for British special operations in World War II.

9. An ultra-lightweight block cipher with string transformations.

10. A comprehensive review on S-box generation methods.

11. Informed Watermarking by Means of Orthogonal and Quasi-Orthogonal Dirty Paper Coding.

12. SC-SA: Byte-Oriented Lightweight Stream Ciphers Based on S-Box Substitution.

13. Color Image Encryption Based on an Evolutionary Codebook and Chaotic Systems.

14. State Department cipher machines and communications security in the early Cold War, 1944–1965.

15. Mediation and Transcendence: Balancing Postphenomenological Theory of Technological Mediation with Karl Jaspers's Metaphysics of Ciphers.

16. Design and implementation in an Altera's cyclone IV EP4CE6E22C8 FPGA board of a fast and robust cipher using combined 1D maps.

17. Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks.

18. Novel, Fast, Strong, and Parallel: A Colored Image Cipher Based on SBTM CPRNG.

19. Product of Finite Maximal P-Codes. This paper was supported in part by HK UGC grants 9040596, 9040511 and City U Strategic Grants 7001189, 7001060, and by the Natural Science Foundation of China (project No. 60073056) and the Guangdong Provincial Natural Science Foundation (project No. 001174).

20. A hierarchical attribute based encryption scheme is designed for document collection.

21. An enhanced LED cipher algorithm performance for data security in IoT systems.

22. Construction of minimal (with respect to inclusion) perfect ciphers.

23. Dynamic RNA Coding Color Image Cipher Based on Chain Feedback Structure.

24. On the Density of Irreducible NFSRs.

25. Visual image encryption scheme based on inter-intra-block scrambling and weighted diffusion.

26. MILP modeling of matrix multiplication: cryptanalysis of KLEIN and PRINCE.

27. High-throughput and area-efficient architectures for image encryption using PRINCE cipher.

28. An enriched cryptosystem based Polybius cipher using graph labeling techniques.

29. Analysis of a late 19th century french cipher created by Major Josse.

30. Efficient hardware implementations of lightweight Simeck Cipher for resource-constrained applications.

31. Cryptanalysis of an image encryption scheme using variant Hill cipher and chaos.

32. Secure blockchain e-voting system using speck cipher.

33. A symmetric key cryptosystem based on singular linear transformation.

34. High-throughput and low-latency ASIC implementation of lightweight cryptography.

35. Research on disturbing white‐box cryptography algorithm based on local differential privacy.

36. Explore the potential of deep learning and hyperchaotic map in the meaningful visual image encryption scheme.

37. Group Key Management using Asynchronous Cipher System Based on XOR Vector Space and Pseudo Random Number Generation for Fog Environment.

38. Automated Classical Cipher Emulation Attacks via Unified Unsupervised Generative Adversarial Networks.

39. Quantum circuit implementation and resource analysis of LBlock and LiCi.

40. Quantum key recovery attacks on tweakable Even–Mansour ciphers.

41. Cracking PURPLE: the identification of homologs in the cryptanalysis of the Angooki Taipu B cipher machine.

42. New Strategies To Improve Differential-Linear Attacks With Applications To Chaskey.

43. Fast lightweight encryption device based on LFSR technique for increasing the speed of LED performance.

44. Improved linear cryptanalysis on 25‐round SMS4.

45. Properties of Sandip transform with incomplete H-Function and applications in cryptography.

46. Genevieve Grotjan's "great discovery".

47. Covert and Secure Communication Using Multiple Invisible Stego Images by Split-Logical Algorithm.

48. Quantum linear cryptanalysis on a toy cipher.

49. How Not To Design An Efficient FHE-Friendly Block Cipher: Seljuk.

50. Row, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung.