Search Results - "cipher"
-
1
A study of caesar cipher and transposition cipher in jawi messages
Published 2018“…Decryption is the reverse process of encryption. Caesar cipher and transposition cipher are two historical ciphers in cryptography. …”
Get full text
-
2
-
3
-
4
-
5
-
6
Enhancement of lightweight block cipher algorithms
Published 2017“…The second direction proposed another lightweight block cipher algorithm called HISEC (Highest Security lightweight block cipher algorithm). …”
Get full text
Get full text
-
7
New directions in cryptanalysis of block ciphers.
Published 2009“…Approach: The interpolation attack was introduced as a cryptanalytic attack against block ciphers. This attack is useful for cryptanalysis using simple algebraic functions as S-boxes. …”
Get full text
Get full text
-
8
Mathematical aspects of selected block ciphers
Published 2015Subjects: “…Ciphers…”
Get full text
Get full text
-
9
Lightweight block cipher algorithms: review paper
Published 2016“…Lightweight block cipher algorithms are very important for constraint environment. …”
Get full text
Get full text
-
10
Cryptanalysis Of Block Ciphers: Generalization, Extensions And Integration
Published 2005“…This thesis is about the crytanalysis of block ciphers, and is organized into 3 parts : Generalization, Extensions and Integrations. …”
Get full text
-
11
Musical Cryptography: Codes, Ciphers, Form, and Function
Published 2024“…Musicologists such as David Løberg Code, Eric Sams, Roy Howat, and Helen Elizabeth Rudeforth will provide the framework for cipher and code-based study, while Johannes Kepler, Mihail Cocos, and Shawn Fowers provide the framework for study of the relationship between music and mathematics. …”
Get full text
-
12
A framework for describing block cipher cryptanalysis
Published 2006“…Block ciphers provide confidentiality by encrypting confidential messages into unintelligible form, which are irreversible without knowledge of the secret key used. …”
Get full text
Get full text
-
13
Lightweight block ciphers: A comparative study
Published 2012“…Although the AES is an excellent and preferred choice for almost all block cipher applications, it is not suitable for extremely constrained environments such as RFID (Radio-Frequency IDentification) tags and sensor networks. …”
Get full text
Get full text
-
14
Key-dependent s-box in lightweight block ciphers
Published 2014“…This paper introduces new methods of how to generate a suitable key-dependent substitution boxes (Sboxes) for use in lightweight block ciphers. An S-box is commonly used in block ciphers to provide the crucial property of nonlinearity. …”
Get full text
Get full text
Get full text
-
15
The vulnerability analysis and the security evaluation of block ciphers
Published 2010Subjects: Get full text
Get full text
-
16
A new 128-bit block cipher
Published 2009“…Even though there have been so much development of the block cipher, the industry still requires another block cipher as long as security features are met. …”
Get full text
Get full text
-
17
A block cipher based on genetic algorithm
Published 2016“…The development of block ciphers have resulted in a number of cryptographic algorithms such as, AES, ARIA, BLOWFISH256, DESL, 3D-AES and many more. …”
Get full text
Get full text
-
18
The Construction Of Quantum Block Cipher For Grover Algorithm
Published 2018“…Similarly to classical computing, to conduct a quantum attack on a classical block cipher, the block cipher must be designed and implemented as a quantum reversible circuit in a quantum platform.…”
Get full text
Get full text
-
19
Fault Analysis of the KATAN Family of Block Ciphers
Published 2012“…We assume a single-bit fault injection model where the adversary is supposed to be able to corrupt a single random bit of the internal state of the cipher and this fault injection process can be repeated (by resetting the cipher); i.e., the faults are transient rather than permanent. …”
Get full text
Get full text
-
20
Comparative study of some symmetric ciphers in mobile systems
Published 2014“…There are various symmetric cryptographic algorithms such as KASUMI cipher, SNOW cipher, ZUC cipher, and AES cipher have been developed for achieving secure mobile communication systems. …”
Get full text
Get full text