Showing 21 - 40 results of 66 for search '"cipher"', query time: 0.05s Refine Results
  1. 21
  2. 22
  3. 23

    DNA Origami Model for Simple Image Decoding by Risheng Wang, Zhixiang Yin, Jianzhong Cui, Jing Yang, Zhen Tang, Xinmu Yang, Xianya Geng

    Published 2020-01-01
    “…When the cipher is correct, the cipher chain can open the molecular beacon and the hairpin structure to display the cipher pattern on the origami base in the solution.…”
    Get full text
    Article
  4. 24

    A Novel Approach for Safeguarding Kurdish Text Files via Modified AES-OTP and Enhanced RSA Cryptosystem on Unreliable Networks by Newroz Nooralddin Abdulrazaq

    Published 2024-06-01
    “…This paper provides a new method for encrypting and decrypting classified text files in the Kurdish alphabet using the modified Advanced Encryption Standard (AES) cipher system with the adoption of Cipher Block Chaining (CBC) mode based on a one-time pad (OTP) cipher. …”
    Get full text
    Article
  5. 25

    New Practical Attacks on GEA-1 Based on a New-Found Weakness by Zheng Wu, Lin Ding, Zhengting Li, Xinhai Wang, Ziyu Guan

    Published 2024-01-01
    “…Now, a variety of current mobile phones still support this standard cipher. In this paper, a structural weakness of the GEA-1 stream cipher that has not been found in previous works is discovered and analyzed. …”
    Get full text
    Article
  6. 26

    Image Encryption Performance Evaluation Based on Poker Test by Shanshan Li, Weiyang Sun

    Published 2016-01-01
    “…The randomness of the cipher text image is tested by calculating the chi-square test value. …”
    Get full text
    Article
  7. 27

    An efficient medical data encryption scheme using selective shuffling and inter-intra pixel diffusion IoT-enabled secure E-healthcare framework by Dhivya Ravichandran, W. Sylvia Lilly Jebarani, Hemalatha Mahalingam, Padmapriya Velupillai Meikandan, Padmapriya Pravinkumar, Rengarajan Amirtharajan

    Published 2025-02-01
    “…Finally, the intra and inter-pixel diffusion is carried out using bit permutation and bit-wise XOR operation to create a highly random cipher image. The initial seed for inter-pixel diffusion is obtained from the hash of intra-pixel diffused images to resist chosen plain text and cipher text attacks. …”
    Get full text
    Article
  8. 28

    New indifferentiability security proof of MDPH hash function by Chun Guo, Tetsu Iwata, Kazuhiko Minematsu

    Published 2022-07-01
    “…When instantiated with an n‐bit block cipher, Naito proved that this achieves the (nearly) optimal indifferentiable security bound of O (n − log n)‐bit security. …”
    Get full text
    Article
  9. 29

    Chaotic Image Encryption Algorithm Based on Circulant Operation by Xiaoling Huang, Guodong Ye, Kwok-Wo Wong

    Published 2013-01-01
    “…Numerical experiments show that the proposed scheme possesses the properties of a large key space to resist brute-force attack, sensitive dependence on secret keys, uniform distribution of gray values in the cipher-image, and zero correlation between two adjacent cipher-image pixels. …”
    Get full text
    Article
  10. 30

    A New Image Encryption Method Using an Optimized Smart Codebook by Rami Sihwail, Dyala Ibrahim

    Published 2025-01-01
    “…Moreover, images go through several processing stages before they are converted into cipher images, including noise, segmentation, and encryption. …”
    Get full text
    Article
  11. 31

    Security evaluation on type‐1 and type‐1‐like 4‐branch generalized Feistel structures and application to reduced‐round Lesamnta‐LW‐BC by Xuan Shen, Guoqiang Liu, Xiaofeng Wang, Bing Sun, Jun He

    Published 2022-09-01
    “…Abstract Generalized Feistel structures (called GFSs for short) are one of the most popular block cipher structures. They are mainly divided into type‐1, type‐2 and type‐3 GFS. …”
    Get full text
    Article
  12. 32

    Entre o violoncelo e o cavaquinho: música e sujeito popular em Machado de Assis by Idelber Avelar

    Published 2011-01-01
    “…Devoting special attention to a set of newspaper chronicles and to the stories “Um homem célebre” and “O machete”, the article postulates that Machado’s work was the first literary reflection on music as a pri- vileged cipher of nationality.…”
    Get full text
    Article
  13. 33

    Intelligent physiological signal infosecurity: Case study in photoplethysmography (PPG) signal by Chia‐Hung Lin, Jian‐Xing Wu, Neng‐Sheng Pai, Pi‐Yun Chen, Chien‐Ming Li, Ching Chou Pai

    Published 2022-05-01
    “…The sine‐power chaotic map is used as a key generator of 256 non‐ordered numbers (key space) to set the private cipher codes. Two RBFNs are used to train an encryptor and a decryptor with the authorised cipher codes. …”
    Get full text
    Article
  14. 34

    A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform by Srinivas Koppu, V. Madhu Viswanatham

    Published 2017-01-01
    “…Compared with existing methods, the proposed method had more robustness to various attacks: brute-force attack, known cipher plaintext, chosen-plaintext, security key space, key sensitivity, correlation analysis and information entropy, and differential attacks. …”
    Get full text
    Article
  15. 35

    An Improved Piecewise Linear Chaotic Map Based Image Encryption Algorithm by Yuping Hu, Congxu Zhu, Zhijian Wang

    Published 2014-01-01
    “…The order of processing pixels is not in accordance with the index of pixels, but it is from beginning or end alternately. The cipher feedback was introduced in diffusion process. …”
    Get full text
    Article
  16. 36

    A Study about Prevent Tampering with Encrypted Messages over the Network Using Digital Signature by Majed Al-khairow, Mohamad Firas Al-halabi

    Published 2022-01-01
    “…Second, the integration of our modified algorithm with cipher algorithms to increase the authenticity of the sent messages. …”
    Get full text
    Article
  17. 37

    Bit-Sliced Implementation of SM4 and New Performance Records by Xin Miao, Lu Li, Chun Guo, Meiqin Wang, Weijia Wang

    Published 2023-01-01
    “…SM4 is a popular block cipher issued by the Office of State Commercial Cryptography Administration (OSCCA) of China. …”
    Get full text
    Article
  18. 38

    5D Hyperchaotic Image Encryption Scheme Based on Fibonacci Q-Matrix by Geeta Biban, Renu Chugh, Anju Panwar, Mohammad Sajid

    Published 2024-01-01
    “…The numerous analyses indicate that the proposed algorithm has a lot of characteristics like the low correlation of adjacent cipher pixels, strong security, and large key space, which can give high confidentiality in image data.…”
    Get full text
    Article
  19. 39

    Reversible data hiding in encrypted images with high payload by Dawen Xu

    Published 2022-07-01
    “…The pre‐processed image is encrypted using a stream cipher, and then the data hider can substitute multi‐MSB values of each available pixel in encrypted image with secret message bits to obtain the marked encrypted image. …”
    Get full text
    Article
  20. 40

    Micro-Trivium: A lightweight algorithm designed for radio frequency identification systems by Shiyong Zhang, Gongliang Chen

    Published 2017-02-01
    “…Trivium is a well-known lightweight synchronous stream cipher that was submitted to the European eSTREAM project in April 2005. …”
    Get full text
    Article