-
61
Image Encryption Using a Lightweight Stream Encryption Algorithm
Published 2012-01-01“…Based on this analysis, it can be concluded that the present algorithm in comparison to A5/1 and W7 stream ciphers has the same security level, is better in terms of the speed of performance, and is used for real-time applications.…”
Get full text
Article -
62
Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing
Published 2014-01-01“…PRINTcipher-48/96 are 48/96-bit block ciphers proposed in CHES 2010 which support the 80/160-bit secret keys, respectively. …”
Get full text
Article -
63
Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis
Published 2013-01-01“…In this paper, we apply this idea to seven SPN block ciphers, AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis. …”
Get full text
Article -
64
A Privacy-Preserving Biometric Recognition System with Visual Cryptography
Published 2022-01-01“…Visual cryptography combines perfect ciphers and secret sharing in cryptography with images, thus eliminating the complex operations in existing privacy-preserving schemes based on cryptography or watermarking. …”
Get full text
Article -
65
Letters of Friedrich Christian Weber to John Robeson from Russia, 1718-1719
Published 2022-05-01“…The article examines various aspects of Weber's diplomatic activities, including the methods he used to collect information in Russia and send it to England, such as bribing Russian officials, resorting to secret agents, ciphers, sending dispatches “under the cover, and others. …”
Get full text
Article -
66
Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption
Published 2024-05-01“…A comparative analysis of several symmetric key ciphers was performed, focusing on handling large datasets. …”
Get full text
Article