Search

Showing total 1,643 results

Search Constraints

Start Over You searched for: Topic block ciphers Remove constraint Topic: block ciphers Publication Year Range Last 50 years Remove constraint Publication Year Range: Last 50 years Language english Remove constraint Language: english
1,643 results

Search Results

2. Implementation of a block cipher algorithm for medical information security on cloud environment: using modified advanced encryption standard approach.

3. Guest Editorial: Selected papers from the 24th International Conference on Information Security and Cryptology (ICISC 2021).

4. A Performance Analysis of Security Protocols for Distributed Measurement Systems Based on Internet of Things with Constrained Hardware and Open Source Infrastructures.

5. Research on Dynamic Searchable Encryption Method Based on Bloom Filter.

6. Boomerang Attacks on Reduced-Round Midori64.

7. Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography.

8. An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault.

9. A Polynomial Multiplication Accelerator for Faster Lattice Cipher Algorithm in Security Chip.

10. An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms.

11. Construction of secure adaptive frequency hopping sequence sets based on AES algorithm.

12. Mixture Differential Cryptanalysis on Round-Reduced SIMON32/64 Using Machine Learning.

13. Observations on the branch number and differential analysis of SPEEDY.

14. Exploring the Efficacy of Lightweight Encryption Techniques: A Comprehensive Review.

15. Review "Improving the Cryptanalysis of Block Cipher Using Artificial Intelligence Algorithms".

16. Development of Security Rules and Mechanisms to Protect Data from Assaults.

17. Temperature-Triggered Hardware Trojan Based Algebraic Fault Analysis of SKINNY-64-64 Lightweight Block Cipher.

18. Data Security Architecture in Cloud Computing based on Elliptic Curve Cryptography with Special Focus on Lowering the Cipher Space.

20. Comprehensive Neural Cryptanalysis on Block Ciphers Using Different Encryption Methods.

21. Efficient implementation of the linear layer of block ciphers with large MDS matrices based on a new lookup table technique.

22. Low area and high throughput hardware implementations for the LILLIPUT cipher.

23. Parallel Multi-core Implementation of the Optimized Speck Cipher.

24. Integral Cryptanalysis of Reduced-Round IIoTBC-A and Full IIoTBC-B.

25. Lightweight ANU-II block cipher on field programmable gate array.

27. Security of medical images based on special orthogonal group and Galois field.

28. New mode of operation inspired by the braid of long hair.

29. Weak rotational property and its application.

30. An automatic decision algorithm and simulation performance analysis for public safety.

31. Design of New Efficient Stream Key Generator to Protect the Classified Information.

32. The state diagram of χ.

33. Nonexistence of perfect permutation codes under the ℓ∞-metric.

34. Quantum Implementation of AIM: Aiming for Low-Depth.

35. Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher.

36. Differential Fault and Algebraic Equation Combined Analysis on PICO.

37. Quantum Implementation of the SAND Algorithm and Its Quantum Resource Estimation for Brute-Force Attack.

38. Enhanced ARIA-based counter mode deterministic random bit generator random number generator implemented in verilog.

39. An ASCON AOP-SystemC Environment for Security Fault Analysis.

40. Achieving Privacy-Preserving and Lightweight Truth Discovery in Mobile Crowdsensing.

41. A novel block encryption method based on Catalan random walks.

42. Designing tweakable enciphering schemes using public permutations.

43. Enhancing Security in ZigBee Wireless Sensor Networks: A New Approach and Mutual Authentication Scheme for D2D Communication.

44. Quantum Neural Network Based Distinguisher on SPECK-32/64.

45. A Block Cipher Algorithm Identification Scheme Based on Hybrid Random Forest and Logistic Regression Model.

46. Chaos-Based Image Encryption: Review, Application, and Challenges.

47. Efficient Attack Scheme against SKINNY-64 Based on Algebraic Fault Analysis.

48. Survey of Blowfish Algorithm for Cloud.

50. Fixed-point attack on Davies—Meyer hash function scheme based on SIMON, SPECK, and SIMECK algorithms.