Academic literature on the topic 'Block cipher'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Block cipher.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Block cipher"
Bucholc, Krzysztof, Krzysztof Chmiel, Anna Grocholewska-Czuryło, Ewa Idzikowska, Izabela Janicka-Lipska, and Janusz Stokłosa. "Scalable PP-1 block cipher." International Journal of Applied Mathematics and Computer Science 20, no. 2 (2010): 401–11. http://dx.doi.org/10.2478/v10006-010-0030-6.
Full textSayyed, Karishma Shaukat, Prof S. R. Ganolkar, and Prof S. O. Rajankar. "FPGA Implementation of Rectangle Lightweight Block Cipher." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (2022): 2426–33. http://dx.doi.org/10.22214/ijraset.2022.42143.
Full textGáll, József, Pinar Gürgez, and Géza Horváth. "Adding an Avalanche Effect to a Stream Cipher Suitable for IoT Devices." Electronics 14, no. 13 (2025): 2546. https://doi.org/10.3390/electronics14132546.
Full textHaryono, Wasis. "Comparison Encryption of How to Work Caesar Cipher, Hill Cipher, Blowfish and Twofish." Data Science: Journal of Computing and Applied Informatics 4, no. 2 (2020): 100–110. http://dx.doi.org/10.32734/jocai.v4.i2-4004.
Full textJang, Kyungbae, Gyeongju Song, Hyunjun Kim, Hyeokdong Kwon, Hyunji Kim, and Hwajeong Seo. "Efficient Implementation of PRESENT and GIFT on Quantum Computers." Applied Sciences 11, no. 11 (2021): 4776. http://dx.doi.org/10.3390/app11114776.
Full textGusmanova, F. R., and G. A. Abdulkarimova. "OVERVIEW OF THE BLOCK ENCRYPTION DEVELOPMENT." BULLETIN Series of Physics & Mathematical Sciences 69, no. 1 (2020): 295–301. http://dx.doi.org/10.51889/2020-1.1728-7901.52.
Full textNawaz, Yasir, and Lei Wang. "Block Cipher in the Ideal Cipher Model: A Dedicated Permutation Modeled as a Black-Box Public Random Permutation." Symmetry 11, no. 12 (2019): 1485. http://dx.doi.org/10.3390/sym11121485.
Full textKim, Bohun, Junghoon Cho, Byungjun Choi, Jongsun Park, and Hwajeong Seo. "Compact Implementations of HIGHT Block Cipher on IoT Platforms." Security and Communication Networks 2019 (December 31, 2019): 1–10. http://dx.doi.org/10.1155/2019/5323578.
Full textGhorai, Shreyasi, Nilanjan Datta, and Mrinal Nandi. "ULBC: An Ultra Light-weight Block Cipher." Journal of Advances in Mathematics and Computer Science 38, no. 8 (2023): 86–100. http://dx.doi.org/10.9734/jamcs/2023/v38i81793.
Full textHieu, Minh Nguyen, Duy Ho Ngoc, Canh Hoang Ngoc, Trung Dinh Phuong, and Manh Tran Cong. "New primitives of controlled elements F2/4 for block ciphers." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 5 (2020): 5470. http://dx.doi.org/10.11591/ijece.v10i5.pp5470-5478.
Full textDissertations / Theses on the topic "Block cipher"
Bose, Gourav. "The 128-bit block cipher MARS." FIU Digital Commons, 2003. http://digitalcommons.fiu.edu/etd/1770.
Full textFjellskaalnes, Stig. "FPGA realization of a public key block cipher." Thesis, Norges Teknisk-Naturvitenskaplige Universitet, Institutt for datateknikk og informasjonsvitenskap, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9086.
Full textQahur, Al Mahri Hassan Musallam Ahmed. "Analysis of selected block cipher modes for authenticated encryption." Thesis, Queensland University of Technology, 2018. https://eprints.qut.edu.au/119361/1/Hassan%20Musallam%20Ahmed_Qahur%20Al%20Mahri_Thesis.pdf.
Full textCivino, Roberto. "Differential attacks using alternative operations and block cipher design." Doctoral thesis, Università degli studi di Trento, 2018. https://hdl.handle.net/11572/368586.
Full textCivino, Roberto. "Differential attacks using alternative operations and block cipher design." Doctoral thesis, University of Trento, 2018. http://eprints-phd.biblio.unitn.it/2808/2/Roberto_Civino_-_PhD_Dissertation_PDFVersion.pdf.
Full textDatta, Avijit. "Exploring new approaches towards design of block cipher testing algorithms." Thesis, University of North Bengal, 2019. http://ir.nbu.ac.in/handle/123456789/3638.
Full textDi, Binbin. "Analysis of one-pass block cipher based authenticated encryption schemes." Thesis, Queensland University of Technology, 2015. https://eprints.qut.edu.au/87437/1/Binbin_Di_Thesis.pdf.
Full textYildirim, Hamdi Murat. "Algebraic Properties Of The Operations Used In Block Cipher Idea." Phd thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/3/12608289/index.pdf.
Full textAlbrecht, Martin. "Algorithmic algebraic techniques and their application to block cipher cryptanalysis." Thesis, Royal Holloway, University of London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.529770.
Full textZ'aba, Muhammad Reza. "Analysis of linear relationships in block ciphers." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/35725/1/Muhammad_Z%27aba_Thesis.pdf.
Full textBooks on the topic "Block cipher"
Knudsen, Lars R., and Matthew J. B. Robshaw. The Block Cipher Companion. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-17342-4.
Full textKnudsen, Lars. The Block Cipher Companion. Springer-Verlag Berlin Heidelberg, 2011.
Find full text1963-, Schneier Bruce, ed. The twofish encryption algorithm: A 128-bit block cipher. J. Wiley, 1999.
Find full textNational Institute of Standards and Technology (U.S.), ed. Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2004.
Find full textStandardization, International Organization for. Information technology: Modes of operation for an n-bit block cipher algorithm. ISO, 1991.
Find full textDworkin, Morris. Recommendation for block cipher modes of operation: Galois/Counter mode (GCM) and GMAC. U.S. Dept. of Commerce, National Institute of Standards and Technology, 2007.
Find full textSakiyama, Kazuo, Yu Sasaki, and Yang Li. Security of Block Ciphers. John Wiley & Sons, Singapore Pte. Ltd, 2015. http://dx.doi.org/10.1002/9781118660027.
Full textInstitution, British Standards. British Standard guide to modes of operation for a 64-bit block cipher algorithm =: Guide des modes opératoires d'un algorithme de chiffrement par blocs de 64 bits = Leitfaden für Betriebsarten für einen 64-Bit-Blockschlüsselalgorithmus. BSI, 1991.
Find full textMoliner, Richard J. De. On the statistical testing of block ciphers. Hartung-Gorre, 1999.
Find full textBook chapters on the topic "Block cipher"
Ferguson, Niels, Bruce Schneier, and Tadayoshi Kohno. "Block Cipher Modes." In Cryptography Engineering. Wiley Publishing, Inc., 2015. http://dx.doi.org/10.1002/9781118722367.ch4.
Full textKnudsen, Lars R., and Gregor Leander. "C2 – Block Cipher." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_552.
Full textKnudsen, Lars R., and Gregor Leander. "PRESENT – Block Cipher." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_605.
Full textSwenson, Christopher. "Block Cipher Cryptanalysis." In Handbook of Information and Communication Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-04117-4_5.
Full textKnudsen, Lars R., and Gregor Leander. "PRESENT – Block Cipher." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_605.
Full textKnudsen, Lars R., and Gregor Leander. "C2 – Block Cipher." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_552.
Full textAshur, Tomer, and Atul Luykx. "An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families." In Security of Ubiquitous Computing Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-10591-4_4.
Full textNakahara, Jorge. "Lai-Massey Block Ciphers." In Lai-Massey Cipher Designs. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-68273-0_2.
Full textGuo, Jian, Thomas Peyrin, Axel Poschmann, and Matt Robshaw. "The LED Block Cipher." In Cryptographic Hardware and Embedded Systems – CHES 2011. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23951-9_22.
Full textDaemen, Joan, and Vincent Rijmen. "The Block Cipher BKSQ." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10721064_22.
Full textConference papers on the topic "Block cipher"
Lv, Weidong, Yufei Chen, and Jia Liu. "A survey of lightweight block cipher." In International Conference on Algorithms, High Performance Computing and Artificial Intelligence, edited by Pavel Loskot and Liang Hu. SPIE, 2024. http://dx.doi.org/10.1117/12.3051956.
Full textSrivaishnavi, Korkonda, Gorigapudi Sowmya, P. Laxmikanth, Manchalla O. V. P. Kumar, and Kiran Mannem. "Design and Implementation of Efficient Block Cipher." In 2024 IEEE International Conference on Information Technology, Electronics and Intelligent Communication Systems (ICITEICS). IEEE, 2024. http://dx.doi.org/10.1109/iciteics61368.2024.10625542.
Full textYang, Jingchun, Xin Jiang, Songyan Xu, and Ran Tao. "A GPU Implementation of PRINCE Block Cipher." In 2024 IEEE 7th International Conference on Computer and Communication Engineering Technology (CCET). IEEE, 2024. https://doi.org/10.1109/ccet62233.2024.10837968.
Full textKun, Zou, Dong Xinfeng, Zhang Fuzhong, and Cheng Rong. "Quantum Attack Implementation of TWINE Block Cipher." In 2025 4th Asia Conference on Algorithms, Computing and Machine Learning (CACML). IEEE, 2025. https://doi.org/10.1109/cacml64929.2025.11010933.
Full textNakahara Jr, Jorge. "On the Design of IDEA-128." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2005. http://dx.doi.org/10.5753/sbseg.2005.21520.
Full textFreitas, Daniel Santana de, та Jorge Nakahara Jr. "χ2 Attacks on Block-Cipher based Compression Functions". У Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2012. http://dx.doi.org/10.5753/sbseg.2012.20538.
Full textNascimento, Eduardo Marsola do, and José Antônio Moreira Xexéo. "A Lightweight Cipher with Integrated Authentication." In Anais Estendidos do Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2018. http://dx.doi.org/10.5753/sbseg_estendido.2018.4138.
Full textCarvalho, Gabriel Cardoso de, Tertuliano Souza Neto, and Thiago do Rêgo Sousa. "Automated security proof of SQUARE, LED and CLEFIA using the MILP technique." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/sbseg.2023.232871.
Full textShishlyannikov, Dmitry, Nikita Zbitnev, and Dmitry Gridin. "Probabilistic Block Cipher." In 2018 Federated Conference on Computer Science and Information Systems. IEEE, 2018. http://dx.doi.org/10.15439/2018f97.
Full textFreitas, Daniel Santana de, and Jorge Nakahara Jr. "Impossible-Differential Attacks on block-cipher based Hash and Compression Functions using 3D and Whirlpool." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2012. http://dx.doi.org/10.5753/sbseg.2012.20539.
Full textReports on the topic "Block cipher"
Dolmatov, V., ed. GOST R 34.12-2015: Block Cipher "Kuznyechik". RFC Editor, 2016. http://dx.doi.org/10.17487/rfc7801.
Full textBaryshkov, D. GOST R 34.12-2015: Block Cipher "Magma". Edited by V. Dolmatov. RFC Editor, 2020. http://dx.doi.org/10.17487/rfc8891.
Full textDworkin, M. J. Recommendation for block cipher modes of operation :. National Institute of Standards and Technology, 2001. http://dx.doi.org/10.6028/nist.sp.800-38a.
Full textDworkin, M. J. Recommendation for block cipher modes of operation :. National Institute of Standards and Technology, 2010. http://dx.doi.org/10.6028/nist.sp.800-38a-add.
Full textDworkin, M. J. Recommendation for block cipher modes of operation :. National Institute of Standards and Technology, 2016. http://dx.doi.org/10.6028/nist.sp.800-38b.
Full textDworkin, M. J. Recommendation for block cipher modes of operation :. National Institute of Standards and Technology, 2005. http://dx.doi.org/10.6028/nist.sp.800-38b-2005.
Full textDworkin, M. J. Recommendation for block cipher modes of operation :. National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-38c.
Full textDworkin, M. J. Recommendation for block cipher modes of operation :. National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-38d.
Full textDworkin, M. J. Recommendation for block cipher modes of operation :. National Institute of Standards and Technology, 2010. http://dx.doi.org/10.6028/nist.sp.800-38e.
Full textDworkin, Morris J. Recommendation for Block Cipher Modes of Operation:. National Institute of Standards and Technology, 2012. http://dx.doi.org/10.6028/nist.sp.800-38f.
Full text