Works matching Ciphers
Results: 5000
Pengamanan Data Berbasis Hill Cipher dengan Operasi Modulo pada Karakter ASCII.
- Published in:
- Techno.com, 2024, v. 23, n. 4, p. 786, doi. 10.62411/tc.v23i4.11523
- By:
- Publication type:
- Article
Optimasi Vigenere Cipher Menggunakan Bitswap dan Transposisi Acak pada Citra RGB.
- Published in:
- Techno.com, 2020, v. 19, n. 2, p. 168, doi. 10.33633/tc.v19i2.3322
- By:
- Publication type:
- Article
Block Cipher in the Ideal Cipher Model: A Dedicated Permutation Modeled as a Black-Box Public Random Permutation.
- Published in:
- Symmetry (20738994), 2019, v. 11, n. 12, p. 1485, doi. 10.3390/sym11121485
- By:
- Publication type:
- Article
An Efficient 2048-bit Block Cipher.
- Published in:
- Malaysian Journal of Mathematical Sciences, 2021, v. 15, p. 141
- By:
- Publication type:
- Article
Perfectly Secure Shannon Cipher Construction Based on the Matrix Power Function.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 5, p. 860, doi. 10.3390/sym12050860
- By:
- Publication type:
- Article
Performance Evaluation of Newly Proposed Lightweight Cipher, BRIGHT.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2019, v. 12, n. 4, p. 71, doi. 10.22266/ijies2019.0831.08
- By:
- Publication type:
- Article
RBFK cipher: a randomized butterfly architecture-based lightweight block cipher for IoT devices in the edge computing environment.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-022-00136-7
- By:
- Publication type:
- Article
Composite Cryptographic Methodologies for Data Transmission Model using Modified Vigenère and Extended Polybius Cipher.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2023, v. 9, n. 2, p. 358
- By:
- Publication type:
- Article
A Sponge-Based Key Expansion Scheme for Modern Block Ciphers.
- Published in:
- Energies (19961073), 2022, v. 15, n. 19, p. 6864, doi. 10.3390/en15196864
- By:
- Publication type:
- Article
Quantum generic attacks on key-alternating Feistel ciphers for shorter keys.
- Published in:
- Quantum Information Processing, 2022, v. 21, n. 6, p. 1, doi. 10.1007/s11128-022-03505-w
- By:
- Publication type:
- Article
Developing a Graphical Domain-Specific Modeling Language for Efficient Lightweight Block Cipher Schemas Configuration: LWBCLang.
- Published in:
- Iraqi Journal of Science, 2024, v. 65, n. 10, p. 5819, doi. 10.24996/ijs.2024.65.10.39
- By:
- Publication type:
- Article
Explicit Upper Bound Of Impossible Differentials For AES-Like Ciphers: Application To uBlock And Midori.
- Published in:
- Computer Journal, 2024, v. 67, n. 2, p. 674, doi. 10.1093/comjnl/bxad009
- By:
- Publication type:
- Article
Statistical Cipher Feedback of Stream Ciphers.
- Published in:
- Computer Journal, 2017, v. 60, n. 12, p. 1839, doi. 10.1093/comjnl/bxx068
- By:
- Publication type:
- Article
Cryptanalysis of Selected ARX-Based Block Ciphers.
- Published in:
- Vietnam Journal of Computer Science (World Scientific), 2024, v. 11, n. 4, p. 553, doi. 10.1142/S2196888824500143
- By:
- Publication type:
- Article
Mapping private keys into one public key using binary matrices and masonic cipher: Caesar cipher as a case study.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 11, p. 1450, doi. 10.1002/sec.1431
- By:
- Publication type:
- Article
TRANSPOLY HILL CIPHER -- AN IMPROVEMENT OVER TRADITIONAL HILL CIPHER.
- Published in:
- International Journal of Advanced Research in Computer Science, 2018, v. 9, n. 1, p. 276, doi. 10.26483/ijarcs.v9i1.5206
- By:
- Publication type:
- Article
Information Security using Adaptive Multidimensional Playfair Cipher.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 372
- By:
- Publication type:
- Article
Generalization for Multidimensional Playfair Cipher.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 379
- By:
- Publication type:
- Article
MPF based symmetric cipher performance comparison to AES and TDES.
- Published in:
- Journal of Mathematical Models in Engineering, 2022, v. 8, n. 2, p. 15, doi. 10.21595/mme.2022.22517
- By:
- Publication type:
- Article
Chaotic encryption algorithm based on alternant of stream cipher and block cipher.
- Published in:
- Nonlinear Dynamics, 2011, v. 63, n. 4, p. 587, doi. 10.1007/s11071-010-9821-4
- By:
- Publication type:
- Article
클러스터를 이용한 고성능 RC4 암호화 하드웨어 설계.
- Published in:
- Journal of the Korea Institute of Information & Communication Engineering, 2019, v. 23, n. 7, p. 875, doi. 10.6109/jkiice.2019.23.7.875
- By:
- Publication type:
- Article
A combination of hill cipher and RC4 methods for text security.
- Published in:
- Telkomnika, 2024, v. 22, n. 2, p. 351, doi. 10.12928/TELKOMNIKA.v22i2.25628
- By:
- Publication type:
- Article
Improved Salsa20 Stream Cipher Diffusion Based on Random Chaotic Maps.
- Published in:
- Informatica (03505596), 2022, v. 46, n. 7, p. 95, doi. 10.31449/inf.v46i7.4279
- By:
- Publication type:
- Article
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem.
- Published in:
- Baghdad Science Journal, 2024, v. 21, n. 1, p. 151, doi. 10.21123/bsj.2023.8361
- By:
- Publication type:
- Article
Towards a fully homomorphic symmetric cipher scheme resistant to plain-text/cipher-text attacks.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 10, p. 14403, doi. 10.1007/s11042-022-12043-7
- By:
- Publication type:
- Article
双混沌自同步流密码算法的设计与应用.
- Published in:
- Telecommunication Engineering, 2023, v. 63, n. 9, p. 1391, doi. 10.20079/j.issn.1001-893x.220617001
- By:
- Publication type:
- Article
Designing a Graphical Domain-Specific Modeling Language for Efficient Block Cipher Configuration: BCLang.
- Published in:
- TEM Journal, 2023, v. 12, n. 4, p. 2038, doi. 10.18421/TEM124-14
- By:
- Publication type:
- Article
Meet-in-the-Middle Differential Fault Analysis on ITUbee Block Cipher.
- Published in:
- Symmetry (20738994), 2023, v. 15, n. 6, p. 1196, doi. 10.3390/sym15061196
- By:
- Publication type:
- Article
Modified Generalized Feistel Network Block Cipher for the Internet of Things.
- Published in:
- Symmetry (20738994), 2023, v. 15, n. 4, p. 900, doi. 10.3390/sym15040900
- By:
- Publication type:
- Article
(Quantum) Time-Memory-Data Tradeoff Attacks on the SNOW-V Stream Cipher.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 6, p. N.PAG, doi. 10.3390/sym14061127
- By:
- Publication type:
- Article
Another Perspective on Automatic Construction of Integral Distinguishers for ARX Ciphers.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 3, p. 461, doi. 10.3390/sym14030461
- By:
- Publication type:
- Article
Almost-Minimal-Round BBB-Secure Tweakable Key-Alternating Feistel Block Cipher.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 4, p. 649, doi. 10.3390/sym13040649
- By:
- Publication type:
- Article
MICKEY 2.0.85: A Secure and Lighter MICKEY 2.0 Cipher Variant with Improved Power Consumption for Smaller Devices in the IoT.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 1, p. 32, doi. 10.3390/sym12010032
- By:
- Publication type:
- Article
Algebraic Properties of the Block Cipher DESL.
- Published in:
- Symmetry (20738994), 2019, v. 11, n. 11, p. 1411, doi. 10.3390/sym11111411
- By:
- Publication type:
- Article
One-Time Kronecker Product-Based Hill Cipher Modification.
- Published in:
- Journal of Information Assurance & Security, 2017, v. 12, n. 3, p. 94
- By:
- Publication type:
- Article
Cryptanalysis of Some Self-Synchronous Chaotic Stream Ciphers and Their Improved Schemes.
- Published in:
- International Journal of Bifurcation & Chaos in Applied Sciences & Engineering, 2021, v. 31, n. 8, p. N.PAG, doi. 10.1142/S021812742150142X
- By:
- Publication type:
- Article
Full-round impossible differential attack on shadow block cipher.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00184-7
- By:
- Publication type:
- Article
Linear Cryptanalysis of PRESENT-like Ciphers with Secret Permutation.
- Published in:
- Computer Journal, 2016, v. 59, n. 4, p. 549, doi. 10.1093/comjnl/bxv074
- By:
- Publication type:
- Article
Application of Simple Power Analysis to Stream Ciphers Constructed Using Feedback Shift Registers.
- Published in:
- Computer Journal, 2015, v. 58, n. 4, p. 961, doi. 10.1093/comjnl/bxu021
- By:
- Publication type:
- Article
Lightweight and secure cipher scheme for multi-homed systems.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 7, p. 6273, doi. 10.1007/s11276-020-02362-8
- By:
- Publication type:
- Article
Stream Ciphers and the eSTREAM Project.
- Published in:
- ISeCure, 2010, v. 2, n. 1, p. 3
- By:
- Publication type:
- Article
Quantum noise stream cipher based on optical digital to analog conversion: Quantum noise stream cipher based...: Z.-Y. Li et al.
- Published in:
- Optical & Quantum Electronics, 2025, v. 57, n. 1, p. 1, doi. 10.1007/s11082-024-08024-9
- By:
- Publication type:
- Article
Conditional differential analysis on the KATAN ciphers based on deep learning.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 3, p. 347, doi. 10.1049/ise2.12099
- By:
- Publication type:
- Article
基于轻量级分组密码算法的 SoC 安全存储器设计.
- Published in:
- Electronic Science & Technology, 2023, v. 36, n. 9, p. 15, doi. 10.16180/j.cnki.issn1007-7820.2023.09.003
- By:
- Publication type:
- Article
Minimizing the Two-Round Even-Mansour Cipher.
- Published in:
- Journal of Cryptology, 2018, v. 31, n. 4, p. 1064, doi. 10.1007/s00145-018-9295-y
- By:
- Publication type:
- Article
Tweakable Block Ciphers.
- Published in:
- Journal of Cryptology, 2011, v. 24, n. 3, p. 588, doi. 10.1007/s00145-010-9073-y
- By:
- Publication type:
- Article
Design a Lightweight Authentication Encryption Based on Stream Cipher and Chaotic Maps with Sponge Structure for Internet of Things Applications.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2023, v. 16, n. 1, p. 532, doi. 10.22266/ijies2023.0228.46
- By:
- Publication type:
- Article
CAvium - Strengthening Trivium Stream Cipher Using Cellular Automata.
- Published in:
- Journal of Cellular Automata, 2012, v. 7, n. 3, p. 179
- By:
- Publication type:
- Article
Ciphertext-only fault analysis on the LEA lightweight cipher.
- Published in:
- Journal of Donghua University (Natural Science Edition), 2023, v. 49, n. 6, p. 135, doi. 10.19886/j.cnki.dhdz.2022.0416
- By:
- Publication type:
- Article
Mixed Hill Cipher methods with triple pass protocol methods.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2021, v. 11, n. 5, p. 4449, doi. 10.11591/ijece.v11i5.pp4449-4457
- By:
- Publication type:
- Article