-
21
Authenticated encryption mode with blocks skipping
Published 2021-10-01Subjects: Get full text
Article -
22
«The black room» the Russian foreign Ministry against Napoleon
Published 2012-10-01Subjects: Get full text
Article -
23
DNA Origami Model for Simple Image Decoding
Published 2020-01-01“…When the cipher is correct, the cipher chain can open the molecular beacon and the hairpin structure to display the cipher pattern on the origami base in the solution.…”
Get full text
Article -
24
A Novel Approach for Safeguarding Kurdish Text Files via Modified AES-OTP and Enhanced RSA Cryptosystem on Unreliable Networks
Published 2024-06-01“…This paper provides a new method for encrypting and decrypting classified text files in the Kurdish alphabet using the modified Advanced Encryption Standard (AES) cipher system with the adoption of Cipher Block Chaining (CBC) mode based on a one-time pad (OTP) cipher. …”
Get full text
Article -
25
New Practical Attacks on GEA-1 Based on a New-Found Weakness
Published 2024-01-01“…Now, a variety of current mobile phones still support this standard cipher. In this paper, a structural weakness of the GEA-1 stream cipher that has not been found in previous works is discovered and analyzed. …”
Get full text
Article -
26
Image Encryption Performance Evaluation Based on Poker Test
Published 2016-01-01“…The randomness of the cipher text image is tested by calculating the chi-square test value. …”
Get full text
Article -
27
An efficient medical data encryption scheme using selective shuffling and inter-intra pixel diffusion IoT-enabled secure E-healthcare framework
Published 2025-02-01“…Finally, the intra and inter-pixel diffusion is carried out using bit permutation and bit-wise XOR operation to create a highly random cipher image. The initial seed for inter-pixel diffusion is obtained from the hash of intra-pixel diffused images to resist chosen plain text and cipher text attacks. …”
Get full text
Article -
28
New indifferentiability security proof of MDPH hash function
Published 2022-07-01“…When instantiated with an n‐bit block cipher, Naito proved that this achieves the (nearly) optimal indifferentiable security bound of O (n − log n)‐bit security. …”
Get full text
Article -
29
Chaotic Image Encryption Algorithm Based on Circulant Operation
Published 2013-01-01“…Numerical experiments show that the proposed scheme possesses the properties of a large key space to resist brute-force attack, sensitive dependence on secret keys, uniform distribution of gray values in the cipher-image, and zero correlation between two adjacent cipher-image pixels. …”
Get full text
Article -
30
A New Image Encryption Method Using an Optimized Smart Codebook
Published 2025-01-01“…Moreover, images go through several processing stages before they are converted into cipher images, including noise, segmentation, and encryption. …”
Get full text
Article -
31
Security evaluation on type‐1 and type‐1‐like 4‐branch generalized Feistel structures and application to reduced‐round Lesamnta‐LW‐BC
Published 2022-09-01“…Abstract Generalized Feistel structures (called GFSs for short) are one of the most popular block cipher structures. They are mainly divided into type‐1, type‐2 and type‐3 GFS. …”
Get full text
Article -
32
Entre o violoncelo e o cavaquinho: música e sujeito popular em Machado de Assis
Published 2011-01-01“…Devoting special attention to a set of newspaper chronicles and to the stories “Um homem célebre” and “O machete”, the article postulates that Machado’s work was the first literary reflection on music as a pri- vileged cipher of nationality.…”
Get full text
Article -
33
Intelligent physiological signal infosecurity: Case study in photoplethysmography (PPG) signal
Published 2022-05-01“…The sine‐power chaotic map is used as a key generator of 256 non‐ordered numbers (key space) to set the private cipher codes. Two RBFNs are used to train an encryptor and a decryptor with the authorised cipher codes. …”
Get full text
Article -
34
A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform
Published 2017-01-01“…Compared with existing methods, the proposed method had more robustness to various attacks: brute-force attack, known cipher plaintext, chosen-plaintext, security key space, key sensitivity, correlation analysis and information entropy, and differential attacks. …”
Get full text
Article -
35
An Improved Piecewise Linear Chaotic Map Based Image Encryption Algorithm
Published 2014-01-01“…The order of processing pixels is not in accordance with the index of pixels, but it is from beginning or end alternately. The cipher feedback was introduced in diffusion process. …”
Get full text
Article -
36
A Study about Prevent Tampering with Encrypted Messages over the Network Using Digital Signature
Published 2022-01-01“…Second, the integration of our modified algorithm with cipher algorithms to increase the authenticity of the sent messages. …”
Get full text
Article -
37
Bit-Sliced Implementation of SM4 and New Performance Records
Published 2023-01-01“…SM4 is a popular block cipher issued by the Office of State Commercial Cryptography Administration (OSCCA) of China. …”
Get full text
Article -
38
5D Hyperchaotic Image Encryption Scheme Based on Fibonacci Q-Matrix
Published 2024-01-01“…The numerous analyses indicate that the proposed algorithm has a lot of characteristics like the low correlation of adjacent cipher pixels, strong security, and large key space, which can give high confidentiality in image data.…”
Get full text
Article -
39
Reversible data hiding in encrypted images with high payload
Published 2022-07-01“…The pre‐processed image is encrypted using a stream cipher, and then the data hider can substitute multi‐MSB values of each available pixel in encrypted image with secret message bits to obtain the marked encrypted image. …”
Get full text
Article -
40
Micro-Trivium: A lightweight algorithm designed for radio frequency identification systems
Published 2017-02-01“…Trivium is a well-known lightweight synchronous stream cipher that was submitted to the European eSTREAM project in April 2005. …”
Get full text
Article