Search Results - "cipher"

Refine Results
  1. 1

    A study of caesar cipher and transposition cipher in jawi messages by Mohd Lokman, Syiham, Chuah, Chai Wen, Ab. Rahman, Nurul Hidayah Binti, A. Hamid, Isredza Rahmi Binti

    Published 2018
    “…Decryption is the reverse process of encryption. Caesar cipher and transposition cipher are two historical ciphers in cryptography. …”
    Get full text
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Enhancement of lightweight block cipher algorithms by Taha Alshaikhli, Imad Fakhri, Al-Dabbagh, Sufyan Salim Mahmood, Zaba, Muhammad Reza

    Published 2017
    “…The second direction proposed another lightweight block cipher algorithm called HISEC (Highest Security lightweight block cipher algorithm). …”
    Get full text
    Get full text
  7. 7

    New directions in cryptanalysis of block ciphers. by RezaeiPour , Davood, Md Said, Mohamad Rushdan

    Published 2009
    “…Approach: The interpolation attack was introduced as a cryptanalytic attack against block ciphers. This attack is useful for cryptanalysis using simple algebraic functions as S-boxes. …”
    Get full text
    Get full text
  8. 8
  9. 9

    Lightweight block cipher algorithms: review paper by Salim, Sufyan, Taha Alshaikhli , Imad Fakhri, Sulaiman, Alyaa Ghanim

    Published 2016
    “…Lightweight block cipher algorithms are very important for constraint environment. …”
    Get full text
    Get full text
  10. 10

    Cryptanalysis Of Block Ciphers: Generalization, Extensions And Integration by Phan, Raphael Chung Wei

    Published 2005
    “…This thesis is about the crytanalysis of block ciphers, and is organized into 3 parts : Generalization, Extensions and Integrations. …”
    Get full text
  11. 11

    Musical Cryptography: Codes, Ciphers, Form, and Function by Thompson, Benjamin

    Published 2024
    “…Musicologists such as David Løberg Code, Eric Sams, Roy Howat, and Helen Elizabeth Rudeforth will provide the framework for cipher and code-based study, while Johannes Kepler, Mihail Cocos, and Shawn Fowers provide the framework for study of the relationship between music and mathematics. …”
    Get full text
  12. 12

    A framework for describing block cipher cryptanalysis by Phan, Raphael C. W., Siddiqi, Mohammad Umar

    Published 2006
    “…Block ciphers provide confidentiality by encrypting confidential messages into unintelligible form, which are irreversible without knowledge of the secret key used. …”
    Get full text
    Get full text
  13. 13

    Lightweight block ciphers: A comparative study by Salim, Sufya, Taha, Imad

    Published 2012
    “…Although the AES is an excellent and preferred choice for almost all block cipher applications, it is not suitable for extremely constrained environments such as RFID (Radio-Frequency IDentification) tags and sensor networks. …”
    Get full text
    Get full text
  14. 14

    Key-dependent s-box in lightweight block ciphers by AlDabbagh, S.S.M., Taha Alshaikhli, Imad Fakhri, Zaba, Muhammad Reza

    Published 2014
    “…This paper introduces new methods of how to generate a suitable key-dependent substitution boxes (Sboxes) for use in lightweight block ciphers. An S-box is commonly used in block ciphers to provide the crucial property of nonlinearity. …”
    Get full text
    Get full text
    Get full text
  15. 15
  16. 16

    A new 128-bit block cipher by Mohd Ali, Fakariah Hani

    Published 2009
    “…Even though there have been so much development of the block cipher, the industry still requires another block cipher as long as security features are met. …”
    Get full text
    Get full text
  17. 17

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…The development of block ciphers have resulted in a number of cryptographic algorithms such as, AES, ARIA, BLOWFISH256, DESL, 3D-AES and many more. …”
    Get full text
    Get full text
  18. 18

    The Construction Of Quantum Block Cipher For Grover Algorithm by Eid, Almazrooie Mishal

    Published 2018
    “…Similarly to classical computing, to conduct a quantum attack on a classical block cipher, the block cipher must be designed and implemented as a quantum reversible circuit in a quantum platform.…”
    Get full text
    Get full text
  19. 19

    Fault Analysis of the KATAN Family of Block Ciphers by Abdul Latip, Shekh Faisal

    Published 2012
    “…We assume a single-bit fault injection model where the adversary is supposed to be able to corrupt a single random bit of the internal state of the cipher and this fault injection process can be repeated (by resetting the cipher); i.e., the faults are transient rather than permanent. …”
    Get full text
    Get full text
  20. 20

    Comparative study of some symmetric ciphers in mobile systems by Jassim, Khalid Fadhil, Alshaikhli, Imad Fakhri Taha

    Published 2014
    “…There are various symmetric cryptographic algorithms such as KASUMI cipher, SNOW cipher, ZUC cipher, and AES cipher have been developed for achieving secure mobile communication systems. …”
    Get full text
    Get full text