Academic literature on the topic 'Block cipher modes of operation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Block cipher modes of operation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Block cipher modes of operation"

1

Nawaz, Yasir, and Lei Wang. "Block Cipher in the Ideal Cipher Model: A Dedicated Permutation Modeled as a Black-Box Public Random Permutation." Symmetry 11, no. 12 (2019): 1485. http://dx.doi.org/10.3390/sym11121485.

Full text
Abstract:
Designing a secure construction has always been a fascinating area for the researchers in the field of symmetric key cryptography. This research aimed to make contributions to the design of secure block cipher in the ideal cipher model whose underlying primitive is a family of n − b i t to n − b i t random permutations indexed by secret key. Our target construction of a secure block ciphers denoted as E [ s ] is built on a simple XOR operation and two block cipher invocations, under the assumptions that the block cipher in use is a pseudorandom permutation. One out of these two block cipher in
APA, Harvard, Vancouver, ISO, and other styles
2

Stallings, William. "NIST Block Cipher Modes of Operation for Confidentiality." Cryptologia 34, no. 2 (2010): 163–75. http://dx.doi.org/10.1080/01611190903185401.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gagné, Martin, Pascal Lafourcade, Yassine Lakhnech, and Reihaneh Safavi-Naini. "Automated Proofs of Block Cipher Modes of Operation." Journal of Automated Reasoning 56, no. 1 (2015): 49–94. http://dx.doi.org/10.1007/s10817-015-9341-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Bin, Ju Long Lan, Yun Fei Guo, and Yuan Yang Zhang. "Design and Implementation of the Block Cipher-SMS4 IP Core." Advanced Materials Research 129-131 (August 2010): 881–85. http://dx.doi.org/10.4028/www.scientific.net/amr.129-131.881.

Full text
Abstract:
Block ciphers play an essential role in securing the wireless communications. In this paper, an FPGA implementation of the new block cipher SMS4 is presented. The SMS4 Intellectual Property (IP) core includes a non-pipelined encryption/decryption data path with an on-the-fly key scheduler and supports both the Electronic Code Book (ECB) and Cipher Block Chaining (CBC) operation modes. Our result shows that the SMS4 IP core can achieve a high throughput using only a relatively small area. It is well suitable for the field of area restrained condition.
APA, Harvard, Vancouver, ISO, and other styles
5

Alzain, Mohammed. "Chaos Baker-based Image Encryption in Operation Modes." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 17, no. 1 (2018): 7153–63. http://dx.doi.org/10.24297/ijct.v17i1.7328.

Full text
Abstract:
This research paper study the application of chaos baker map for digital image encryption in different operation modes. The employed modes include the electronic code book (ECB), cipher block chaining (CBC), output feedback chaining (OFB), and cipher feedback chaining (CFB). The proposed method works by applying the chaos baker map in different operation modes for encrypting digital images. A group of tests were carried out to examine the impact of operation modes on chaos baker-based encryption. This is done using several encryption metrics like visual inspection, statistical measures, entrop
APA, Harvard, Vancouver, ISO, and other styles
6

Tsaregorodtsev, K. D. "Analysis of block cipher modes of operation for rfid devices." Prikladnaya diskretnaya matematika. Prilozhenie, no. 13 (September 1, 2020): 67–69. http://dx.doi.org/10.17223/2226308x/13/20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Stallings, William. "NIST Block Cipher Modes of Operation for Authentication and Combined Confidentiality and Authentication." Cryptologia 34, no. 3 (2010): 225–35. http://dx.doi.org/10.1080/01611191003598295.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Seo, Hwajeong, Hyunjun Kim, Kyungbae Jang, et al. "Secure HIGHT Implementation on ARM Processors." Mathematics 9, no. 9 (2021): 1044. http://dx.doi.org/10.3390/math9091044.

Full text
Abstract:
Secure and compact designs of HIGHT block cipher on representative ARM microcontrollers are presented in this paper. We present several optimizations for implementations of the HIGHT block cipher, which exploit different parallel approaches, including task parallelism and data parallelism methods, for high-speed and high-throughput implementations. For the efficient parallel implementation of the HIGHT block cipher, the SIMD instructions of ARM architecture are fully utilized. These instructions support four-way 8-bit operations in the parallel way. The length of primitive operations in the HI
APA, Harvard, Vancouver, ISO, and other styles
9

Klyucharev, P. G. "On Statistical Testing of Block Ciphers." Mathematics and Mathematical Modeling, no. 5 (November 12, 2018): 35–56. http://dx.doi.org/10.24108/mathm.0518.0000132.

Full text
Abstract:
Block ciphers form one of the main classes of cryptographic algorithms. One of the challenges in development of block ciphers, like any other cryptographic algorithms, is the analysis of their cryptographic security. In the course of such analysis, statistical testing of block ciphers is often used. The paper reviews literature on statistical testing of block ciphers.The first section of the paper briefly and informally discusses approaches to the definition of the concept of a random sequence, including the Kolmogorov, von Mises, and Martin-Löf approaches and the unpredictability-related appr
APA, Harvard, Vancouver, ISO, and other styles
10

Mehran, Narges, and Mohammad Reza Khayyambashi. "Performance Evaluation of Authentication-Encryption and Confidentiality Block Cipher Modes of Operation on Digital Image." International Journal of Computer Network and Information Security 9, no. 9 (2017): 30–37. http://dx.doi.org/10.5815/ijcnis.2017.09.04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Block cipher modes of operation"

1

Škoda, Martin. "Implementace symetrické blokové šifry AES na moderních procesorech." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220616.

Full text
Abstract:
The main aim of master's thesis is usage of new instructions from instruction set called Intel® Advanced Encryption Standard New Instructions (AES-NI), which is available on processors with code name Westmere and newer. In theoretical part, there are described symmetric block ciphers and their operational modes. Cipher AES is described in details, especially used block transformations, key expansion and equivalent inverse cipher. Next topic is description of instructions of AES-NI instruction set – their function is explained using pseudo codes of instructions and there are examples of their u
APA, Harvard, Vancouver, ISO, and other styles
2

Kopčan, Marek. "Simulace a analýza provozu blokové šifry se statistickou samosynchronizací." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217308.

Full text
Abstract:
There is a enormous rise in importance of cryptography. In age of hi-technologies, where information are the most valuable asset, is need to protect this value. But we need to transport information between us and keep information confidental. In this case we use special modes of block cipher because of defect in communication canal. Not all modes are able to deal with this problem. For this purpose, there are special modes. This work deal with self-synchronization modes of block cipher. It is protection of tranfered information in communication canal against different types of defects. We will
APA, Harvard, Vancouver, ISO, and other styles
3

許育彰. "VLSI Implementation and IP Design for Blowfish Block Cipher with Operation Mode." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/08633048765352405341.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

LIN, PING-HSIEN, and 林秉賢. "Study of Fast Stream Cipher based on Block Cipher Stream Modes." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/66pe5a.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Block cipher modes of operation"

1

Standardization, International Organization for. Information technology: Modes of operation for an n-bit block cipher algorithm. ISO, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Institution, British Standards. British Standard guide to modes of operation for a 64-bit block cipher algorithm =: Guide des modes opératoires d'un algorithme de chiffrement par blocs de 64 bits = Leitfaden für Betriebsarten für einen 64-Bit-Blockschlüsselalgorithmus. BSI, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Martin, Keith M. Symmetric Encryption. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0004.

Full text
Abstract:
In this chapter, we focus on symmetric encryption. We begin by identifying two different types of symmetric encryption algorithm, namely, stream and block ciphers. We discuss the basic idea behind a stream cipher and consider their properties and applications. We then introduce block ciphers. We focus on two extremely important and influential block cipher algorithms, the Data Encryption Standard and the Advanced Encryption Standard, discussing the history of their development as well as their basic design. We then introduce the modes of operation of a block cipher, explaining why different mo
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Block cipher modes of operation"

1

Preneel, Bart. "Modes of Operation of a Block Cipher." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_599.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Phan, Raphael C. –W, and Mohammad Umar Siddiqi. "Related-Mode Attacks on Block Cipher Modes of Operation." In Computational Science and Its Applications – ICCSA 2005. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11424857_73.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gómez Pardo, José Luis. "Block Ciphers and Modes of Operation." In Introduction to Cryptography with Maple. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32166-5_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Smart, Nigel P. "Block Ciphers and Modes of Operation." In Cryptography Made Simple. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21936-3_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chakraborty, Debrup, and Francisco Rodríguez Henríquez. "Block Cipher Modes of Operation from a Hardware Implementation Perspective." In Cryptographic Engineering. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-71817-0_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shimizu, Toshiya, and Takeshi Shimoyama. "Block Cipher Modes of Operation for Heterogeneous Format Preserving Encryption." In Information Security Practice and Experience. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72359-4_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Machicao, Jeaneth, Anderson Marco, and Odemir Bruno. "Lyapunov Exponent: A Qualitative Ranking of Block Cipher Modes of Operation." In Proceedings of the European Conference on Complex Systems 2012. Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-00395-5_117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gagné, Martin, Pascal Lafourcade, Yassine Lakhnech, and Reihaneh Safavi-Naini. "Automated Verification of Block Cipher Modes of Operation, an Improved Method." In Foundations and Practice of Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27901-0_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Huang, Yi-Li, Fang-Yie Leu, Jung-Chun Liu, and Jing-Hao Yang. "A Block Cipher Mode of Operation with Two Keys." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36818-9_43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sharma, Purva, and Rajendra Purohit. "Performance Evaluation of Symmetric Block Cipher RC6 with ECB and CBC Operation Modes." In International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03146-6_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Block cipher modes of operation"

1

Malozemoff, Alex J., Jonathan Katz, and Matthew D. Green. "Automated Analysis and Synthesis of Block-Cipher Modes of Operation." In 2014 IEEE 27th Computer Security Foundations Symposium (CSF). IEEE, 2014. http://dx.doi.org/10.1109/csf.2014.18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bauer, Gernot R., Philipp Potisk, and Stefan Tillich. "Comparing Block Cipher Modes of Operation on MICAz Sensor Nodes." In 2009 17th Euromicro International Conference on Parallel, Distributed and Network-based Processing. IEEE, 2009. http://dx.doi.org/10.1109/pdp.2009.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gueron, Shay, and Yehuda Lindell. "Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation." In CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2017. http://dx.doi.org/10.1145/3133956.3133992.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Huang, Yi-Li, Fang-Yie Leu, Jung-Chun Liu, et al. "Building a block cipher mode of operation with feedback keys." In 2013 IEEE 22nd International Symposium on Industrial Electronics (ISIE). IEEE, 2013. http://dx.doi.org/10.1109/isie.2013.6563875.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sahi, Aqeel, David Lai, and Yan Li. "An Efficient Hash Based Parallel Block Cipher Mode of Operation." In 2018 3rd International Conference on Computer and Communication Systems (ICCCS). IEEE, 2018. http://dx.doi.org/10.1109/ccoms.2018.8463342.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Trabelsi, Oussama, Lilia Sfaxi, and Riadh Robbana. "DCBC: A Distributed High-performance Block-Cipher Mode of Operation." In 17th International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2020. http://dx.doi.org/10.5220/0009793300860097.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Thoms, Graham, Radu Muresan, and Arafat Al-Dweik. "Design of Chaotic Block Cipher Operation Mode for Intelligent Transportation Systems." In 2019 IEEE International Conference on Consumer Electronics (ICCE). IEEE, 2019. http://dx.doi.org/10.1109/icce.2019.8661961.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Luo, Lan, ZhiGuang Qin, ShaoQuan Jiang, and Jian Wang. "A Key Delay Design Operation Model of Block Cipher Algorithm in Network." In International Conference on Intelligent Systems and Knowledge Engineering 2007. Atlantis Press, 2007. http://dx.doi.org/10.2991/iske.2007.78.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Adekunle, A. A., and S. R. Woodhead. "A Resourceful Combined Block Cipher Mode of Operation for Packetised Network Communication." In 2010 Fourth International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST). IEEE, 2010. http://dx.doi.org/10.1109/ngmast.2010.44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zacek, Petr, Roman Jasek, and David Malanik. "Possibilities and testing of CPRNG in block cipher mode of operation PM-DC-LM." In INTERNATIONAL CONFERENCE OF NUMERICAL ANALYSIS AND APPLIED MATHEMATICS 2015 (ICNAAM 2015). Author(s), 2016. http://dx.doi.org/10.1063/1.4951912.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Block cipher modes of operation"

1

Dworkin, M. J. Recommendation for block cipher modes of operation :. National Institute of Standards and Technology, 2001. http://dx.doi.org/10.6028/nist.sp.800-38a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dworkin, M. J. Recommendation for block cipher modes of operation :. National Institute of Standards and Technology, 2010. http://dx.doi.org/10.6028/nist.sp.800-38a-add.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dworkin, M. J. Recommendation for block cipher modes of operation :. National Institute of Standards and Technology, 2016. http://dx.doi.org/10.6028/nist.sp.800-38b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dworkin, M. J. Recommendation for block cipher modes of operation :. National Institute of Standards and Technology, 2005. http://dx.doi.org/10.6028/nist.sp.800-38b-2005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dworkin, M. J. Recommendation for block cipher modes of operation :. National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-38c.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dworkin, M. J. Recommendation for block cipher modes of operation :. National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-38d.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dworkin, M. J. Recommendation for block cipher modes of operation :. National Institute of Standards and Technology, 2010. http://dx.doi.org/10.6028/nist.sp.800-38e.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dworkin, Morris J. Recommendation for Block Cipher Modes of Operation:. National Institute of Standards and Technology, 2012. http://dx.doi.org/10.6028/nist.sp.800-38f.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dworkin, Morris. Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption. National Institute of Standards and Technology, 2016. http://dx.doi.org/10.6028/nist.sp.800-38g.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!