Zobrazeno 1 - 10
of 10 526
pro vyhledávání: '"Block cipher"'
Publikováno v:
Cybersecurity, Vol 7, Iss 1, Pp 1-17 (2024)
Abstract The Generalized Feistel Structure ( $$\texttt{GFS}$$ GFS ) is one of the most widely used frameworks in symmetric cipher design. In FES 2010, Suzaki and Minematsu strengthened the cryptanalysis security of $$\texttt{GFS}$$ GFS by searching f
Externí odkaz:
https://doaj.org/article/22bbbe8cad7d42e58c21105414ea4547
Publikováno v:
Journal of Engineering, Vol 30, Iss 11 (2024)
The use of information transfer is a major reason for the spread of information piracy, especially digital information that includes audio or other information, to preserve data. Encrypting voice messages is considered one of the most secure ways to
Externí odkaz:
https://doaj.org/article/9e6f9b6bf7a04c2eb42cd75b92da3a03
Autor:
omar dawood
Publikováno v:
Iraqi Journal for Computer Science and Mathematics, Vol 5, Iss 3 (2024)
With the recent increase in the risks and attacks facing our daily lives and digital environment around us, the trend towards securing data has become inevitable. Block ciphers play a crucial role in modern crypto-applications such as secure network
Externí odkaz:
https://doaj.org/article/b1f44d27fcfa4b9aa386c4cabc090d6f
Autor:
Bahram Rashidi
Publikováno v:
International Journal of Industrial Electronics, Control and Optimization, Vol 7, Iss 1, Pp 41-51 (2024)
In this paper, we design a lightweight and modified random key generation for PRESENT block cipher which is applicable in the encryption of the digital signals. In the block ciphers, the master key is used directly in the encryption process for the d
Externí odkaz:
https://doaj.org/article/a2bad1243198456ba344589ecd7c7053
Autor:
Dongyoung Roh
Publikováno v:
IEEE Access, Vol 12, Pp 103839-103847 (2024)
CHAM is a family of lightweight block ciphers with block sizes of 64 bits and 128 bits. CHAM performs very well in lightweight environments and is known to be one of the block ciphers that can be implemented with the smallest hardware area. In this p
Externí odkaz:
https://doaj.org/article/fb5a4a1f0716441ca1953f81e0b3ac87
Publikováno v:
IEEE Access, Vol 12, Pp 90853-90861 (2024)
Substitution boxes (S-boxes) play an important role in symmetric key cryptography because they add complexity and resist cryptanalysis, improving the overall security of encrypted data. The conventional construction of substitution boxes (S-boxes) ha
Externí odkaz:
https://doaj.org/article/088ab140b3834ba291d89f62bfdbf427
Autor:
Sunil Kumar, Dilip Kumar, Hemraj Lamkuche, Vijay Shankar Sharma, Hend Khalid Alkahtani, Muna Elsadig, Mariyam Aysha Bivi
Publikováno v:
IEEE Access, Vol 12, Pp 39430-39449 (2024)
The AES (Advance Encryption Standard) has made the development of new block ciphers unnecessary; it is now the de facto standard for most uses of block ciphers. However, the AES is still not well-suited for very limited contexts like RFID (Radio-Freq
Externí odkaz:
https://doaj.org/article/f87db51d3e5148a58c3a4fa055677ebd
Autor:
G. Sripriyanka, Anand Mahendran
Publikováno v:
IEEE Access, Vol 12, Pp 17328-17348 (2024)
The coronavirus disease 2019 (COVID-19) epidemic had a momentous influence on the state of universal health and how people live their lives in every nation. The combination of the Internet of Things (IoT) with medical systems is referred to as the
Externí odkaz:
https://doaj.org/article/df191c071fb141adbca37c8ca23ccafb
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 2 (2024)
Authenticated Encryption (AE) modes of operation based on Tweakable Block Ciphers (TBC) usually measure efficiency in the number of calls to the underlying primitive per message block. On the one hand, many existing solutions reach a primitive-rate o
Externí odkaz:
https://doaj.org/article/ded334cc6f344bc6ada2d4f6ad4abe30
Autor:
Suaad Ali Abead, Nada Hussein M. Ali
Publikováno v:
Journal of Applied Engineering and Technological Science, Vol 5, Iss 2 (2024)
Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processin
Externí odkaz:
https://doaj.org/article/94fa1c79804e44b490feee54c471260d