Search alternatives:
international data » international delphi (Expand Search)
Showing 1 - 20 results of 60 for search 'International Data Encryption Algorithm', query time: 0.12s Refine Results
  1. 1

    Key committing attack on Tiaoxin-346 algorithm by Nan Liu, Chenhui Jin, Junwei Yu

    Published 2025-04-01
    “…It ensures that an adversary cannot decrypt a given ciphertext to different sets of key, nonce, and associated data. In this study, we explore a key committing attack on the authenticated encryption stream cipher Tiaoxin-346 from the perspective of internal state collisions. …”
    Get full text
    Article
  2. 2

    Analyzing cryptographic algorithm efficiency with in graph-based encryption models by Yashmin Banu, Biplab Kumar Rath, Debasis Gountia

    Published 2025-07-01
    “…The CPU's internal clock was employed to record the execution time of encryption and decryption operations, facilitating the assessment of time complexity for both algorithms. …”
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Development of a confidential search algorithm in distributed systems by E. M. Shiryaev, N. N. Kucherov, O. V. Krivolapova

    Published 2023-09-01
    “…This paper deals with distributed computing systems, as well as distributed data storage systems. Given the existing internal threats to such systems. …”
    Get full text
    Article
  12. 12
  13. 13

    Individual health passport storage, sharing and verification scheme based on blockchain by GAO Hancheng, JI Haoyu, GAO Chenhao, HUANG Haiping

    Published 2024-04-01
    “…This scheme employed a hybrid on-chain and off-chain storage methodology and incorporated searchable encryption with blockchain technology. This integration aimed to streamline blockchain storage, alleviating the storage load while guaranteeing the dependable archiving and secure dissemination of user-sensitive data. …”
    Get full text
    Article
  14. 14

    ANALYSIS OF THE CHARACTERISTICS OF INTERNATIONAL STANDARD ALGORITHMS «LIGHTWEIGHT CRYPTOGRAPHY» – ISO/IEC 29192-3:2012 by A. S. Poljakov, V. E. Samsonov

    Published 2016-10-01
    “…The data on the characteristics of international standard algorithms «lightweight cryptography» while application in hardware implementation based on microchips of FPGA are provided. …”
    Get full text
    Article
  15. 15

    Example of internal function for Sponge scheme built on the basis of the generalized AES design methodology by R. M. Ospanov, Ye. N. Seitkulov, B. B. Yergaliyeva, N. M. Sisenov

    Published 2021-06-01
    “…The most common approach is to use a permutation based on a symmetric block encryption algorithm with constants as the key. This article builds an internal  function  using  the  generalized  AES  design  methodology. …”
    Get full text
    Article
  16. 16
  17. 17

    A novel dilated weighted recurrent neural network (RNN)-based smart contract for secure sharing of big data in Ethereum blockchain using hybrid encryption schemes by Swetha S, Joe Prathap P M

    Published 2025-06-01
    “…This algorithm manages keys efficiently and securely, which improves data security during blockchain operations. …”
    Get full text
    Article
  18. 18
  19. 19
  20. 20