Showing 61 - 66 results of 66 for search '"cipher"', query time: 0.03s Refine Results
  1. 61

    Image Encryption Using a Lightweight Stream Encryption Algorithm by Saeed Bahrami, Majid Naderi

    Published 2012-01-01
    “…Based on this analysis, it can be concluded that the present algorithm in comparison to A5/1 and W7 stream ciphers has the same security level, is better in terms of the speed of performance, and is used for real-time applications.…”
    Get full text
    Article
  2. 62

    Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing by Yuseop Lee, Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong

    Published 2014-01-01
    “…PRINTcipher-48/96 are 48/96-bit block ciphers proposed in CHES 2010 which support the 80/160-bit secret keys, respectively. …”
    Get full text
    Article
  3. 63

    Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis by Jinkeon Kang, Kitae Jeong, Jaechul Sung, Seokhie Hong, Kyungho Lee

    Published 2013-01-01
    “…In this paper, we apply this idea to seven SPN block ciphers, AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis. …”
    Get full text
    Article
  4. 64

    A Privacy-Preserving Biometric Recognition System with Visual Cryptography by Lijing Ren, Denghui Zhang

    Published 2022-01-01
    “…Visual cryptography combines perfect ciphers and secret sharing in cryptography with images, thus eliminating the complex operations in existing privacy-preserving schemes based on cryptography or watermarking. …”
    Get full text
    Article
  5. 65

    Letters of Friedrich Christian Weber to John Robeson from Russia, 1718-1719 by I. I. Fedyukin, A. D. Novikova

    Published 2022-05-01
    “…The article examines various aspects of Weber's diplomatic activities, including the methods he used to collect information in Russia and send it to England, such as bribing Russian officials, resorting to secret agents, ciphers, sending dispatches “under the cover, and others. …”
    Get full text
    Article
  6. 66

    Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption by Rebwar Khalid Muhammed, Ribwar Rashid Aziz, Alla Ahmad Hassan, Aso Mohammed Aladdin, Shaida Jumaah Saydah, Tarik Ahmed Rashid, Bryar Ahmad Hassan

    Published 2024-05-01
    “…A comparative analysis of several symmetric key ciphers was performed, focusing on handling large datasets. …”
    Get full text
    Article