Academic literature on the topic 'Block cipher modes of operation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Block cipher modes of operation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Block cipher modes of operation"
Nawaz, Yasir, and Lei Wang. "Block Cipher in the Ideal Cipher Model: A Dedicated Permutation Modeled as a Black-Box Public Random Permutation." Symmetry 11, no. 12 (2019): 1485. http://dx.doi.org/10.3390/sym11121485.
Full textStallings, William. "NIST Block Cipher Modes of Operation for Confidentiality." Cryptologia 34, no. 2 (2010): 163–75. http://dx.doi.org/10.1080/01611190903185401.
Full textGagné, Martin, Pascal Lafourcade, Yassine Lakhnech, and Reihaneh Safavi-Naini. "Automated Proofs of Block Cipher Modes of Operation." Journal of Automated Reasoning 56, no. 1 (2015): 49–94. http://dx.doi.org/10.1007/s10817-015-9341-5.
Full textWang, Bin, Ju Long Lan, Yun Fei Guo, and Yuan Yang Zhang. "Design and Implementation of the Block Cipher-SMS4 IP Core." Advanced Materials Research 129-131 (August 2010): 881–85. http://dx.doi.org/10.4028/www.scientific.net/amr.129-131.881.
Full textAlzain, Mohammed. "Chaos Baker-based Image Encryption in Operation Modes." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 17, no. 1 (2018): 7153–63. http://dx.doi.org/10.24297/ijct.v17i1.7328.
Full textTsaregorodtsev, K. D. "Analysis of block cipher modes of operation for rfid devices." Prikladnaya diskretnaya matematika. Prilozhenie, no. 13 (September 1, 2020): 67–69. http://dx.doi.org/10.17223/2226308x/13/20.
Full textStallings, William. "NIST Block Cipher Modes of Operation for Authentication and Combined Confidentiality and Authentication." Cryptologia 34, no. 3 (2010): 225–35. http://dx.doi.org/10.1080/01611191003598295.
Full textSeo, Hwajeong, Hyunjun Kim, Kyungbae Jang, et al. "Secure HIGHT Implementation on ARM Processors." Mathematics 9, no. 9 (2021): 1044. http://dx.doi.org/10.3390/math9091044.
Full textKlyucharev, P. G. "On Statistical Testing of Block Ciphers." Mathematics and Mathematical Modeling, no. 5 (November 12, 2018): 35–56. http://dx.doi.org/10.24108/mathm.0518.0000132.
Full textMehran, Narges, and Mohammad Reza Khayyambashi. "Performance Evaluation of Authentication-Encryption and Confidentiality Block Cipher Modes of Operation on Digital Image." International Journal of Computer Network and Information Security 9, no. 9 (2017): 30–37. http://dx.doi.org/10.5815/ijcnis.2017.09.04.
Full textDissertations / Theses on the topic "Block cipher modes of operation"
Škoda, Martin. "Implementace symetrické blokové šifry AES na moderních procesorech." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220616.
Full textKopčan, Marek. "Simulace a analýza provozu blokové šifry se statistickou samosynchronizací." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217308.
Full text許育彰. "VLSI Implementation and IP Design for Blowfish Block Cipher with Operation Mode." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/08633048765352405341.
Full textLIN, PING-HSIEN, and 林秉賢. "Study of Fast Stream Cipher based on Block Cipher Stream Modes." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/66pe5a.
Full textBooks on the topic "Block cipher modes of operation"
Standardization, International Organization for. Information technology: Modes of operation for an n-bit block cipher algorithm. ISO, 1991.
Find full textInstitution, British Standards. British Standard guide to modes of operation for a 64-bit block cipher algorithm =: Guide des modes opératoires d'un algorithme de chiffrement par blocs de 64 bits = Leitfaden für Betriebsarten für einen 64-Bit-Blockschlüsselalgorithmus. BSI, 1991.
Find full textMartin, Keith M. Symmetric Encryption. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0004.
Full textBook chapters on the topic "Block cipher modes of operation"
Preneel, Bart. "Modes of Operation of a Block Cipher." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_599.
Full textPhan, Raphael C. –W, and Mohammad Umar Siddiqi. "Related-Mode Attacks on Block Cipher Modes of Operation." In Computational Science and Its Applications – ICCSA 2005. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11424857_73.
Full textGómez Pardo, José Luis. "Block Ciphers and Modes of Operation." In Introduction to Cryptography with Maple. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32166-5_4.
Full textSmart, Nigel P. "Block Ciphers and Modes of Operation." In Cryptography Made Simple. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21936-3_13.
Full textChakraborty, Debrup, and Francisco Rodríguez Henríquez. "Block Cipher Modes of Operation from a Hardware Implementation Perspective." In Cryptographic Engineering. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-71817-0_12.
Full textShimizu, Toshiya, and Takeshi Shimoyama. "Block Cipher Modes of Operation for Heterogeneous Format Preserving Encryption." In Information Security Practice and Experience. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72359-4_15.
Full textMachicao, Jeaneth, Anderson Marco, and Odemir Bruno. "Lyapunov Exponent: A Qualitative Ranking of Block Cipher Modes of Operation." In Proceedings of the European Conference on Complex Systems 2012. Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-00395-5_117.
Full textGagné, Martin, Pascal Lafourcade, Yassine Lakhnech, and Reihaneh Safavi-Naini. "Automated Verification of Block Cipher Modes of Operation, an Improved Method." In Foundations and Practice of Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27901-0_3.
Full textHuang, Yi-Li, Fang-Yie Leu, Jung-Chun Liu, and Jing-Hao Yang. "A Block Cipher Mode of Operation with Two Keys." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36818-9_43.
Full textSharma, Purva, and Rajendra Purohit. "Performance Evaluation of Symmetric Block Cipher RC6 with ECB and CBC Operation Modes." In International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03146-6_13.
Full textConference papers on the topic "Block cipher modes of operation"
Malozemoff, Alex J., Jonathan Katz, and Matthew D. Green. "Automated Analysis and Synthesis of Block-Cipher Modes of Operation." In 2014 IEEE 27th Computer Security Foundations Symposium (CSF). IEEE, 2014. http://dx.doi.org/10.1109/csf.2014.18.
Full textBauer, Gernot R., Philipp Potisk, and Stefan Tillich. "Comparing Block Cipher Modes of Operation on MICAz Sensor Nodes." In 2009 17th Euromicro International Conference on Parallel, Distributed and Network-based Processing. IEEE, 2009. http://dx.doi.org/10.1109/pdp.2009.16.
Full textGueron, Shay, and Yehuda Lindell. "Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation." In CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2017. http://dx.doi.org/10.1145/3133956.3133992.
Full textHuang, Yi-Li, Fang-Yie Leu, Jung-Chun Liu, et al. "Building a block cipher mode of operation with feedback keys." In 2013 IEEE 22nd International Symposium on Industrial Electronics (ISIE). IEEE, 2013. http://dx.doi.org/10.1109/isie.2013.6563875.
Full textSahi, Aqeel, David Lai, and Yan Li. "An Efficient Hash Based Parallel Block Cipher Mode of Operation." In 2018 3rd International Conference on Computer and Communication Systems (ICCCS). IEEE, 2018. http://dx.doi.org/10.1109/ccoms.2018.8463342.
Full textTrabelsi, Oussama, Lilia Sfaxi, and Riadh Robbana. "DCBC: A Distributed High-performance Block-Cipher Mode of Operation." In 17th International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2020. http://dx.doi.org/10.5220/0009793300860097.
Full textThoms, Graham, Radu Muresan, and Arafat Al-Dweik. "Design of Chaotic Block Cipher Operation Mode for Intelligent Transportation Systems." In 2019 IEEE International Conference on Consumer Electronics (ICCE). IEEE, 2019. http://dx.doi.org/10.1109/icce.2019.8661961.
Full textLuo, Lan, ZhiGuang Qin, ShaoQuan Jiang, and Jian Wang. "A Key Delay Design Operation Model of Block Cipher Algorithm in Network." In International Conference on Intelligent Systems and Knowledge Engineering 2007. Atlantis Press, 2007. http://dx.doi.org/10.2991/iske.2007.78.
Full textAdekunle, A. A., and S. R. Woodhead. "A Resourceful Combined Block Cipher Mode of Operation for Packetised Network Communication." In 2010 Fourth International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST). IEEE, 2010. http://dx.doi.org/10.1109/ngmast.2010.44.
Full textZacek, Petr, Roman Jasek, and David Malanik. "Possibilities and testing of CPRNG in block cipher mode of operation PM-DC-LM." In INTERNATIONAL CONFERENCE OF NUMERICAL ANALYSIS AND APPLIED MATHEMATICS 2015 (ICNAAM 2015). Author(s), 2016. http://dx.doi.org/10.1063/1.4951912.
Full textReports on the topic "Block cipher modes of operation"
Dworkin, M. J. Recommendation for block cipher modes of operation :. National Institute of Standards and Technology, 2001. http://dx.doi.org/10.6028/nist.sp.800-38a.
Full textDworkin, M. J. Recommendation for block cipher modes of operation :. National Institute of Standards and Technology, 2010. http://dx.doi.org/10.6028/nist.sp.800-38a-add.
Full textDworkin, M. J. Recommendation for block cipher modes of operation :. National Institute of Standards and Technology, 2016. http://dx.doi.org/10.6028/nist.sp.800-38b.
Full textDworkin, M. J. Recommendation for block cipher modes of operation :. National Institute of Standards and Technology, 2005. http://dx.doi.org/10.6028/nist.sp.800-38b-2005.
Full textDworkin, M. J. Recommendation for block cipher modes of operation :. National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-38c.
Full textDworkin, M. J. Recommendation for block cipher modes of operation :. National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-38d.
Full textDworkin, M. J. Recommendation for block cipher modes of operation :. National Institute of Standards and Technology, 2010. http://dx.doi.org/10.6028/nist.sp.800-38e.
Full textDworkin, Morris J. Recommendation for Block Cipher Modes of Operation:. National Institute of Standards and Technology, 2012. http://dx.doi.org/10.6028/nist.sp.800-38f.
Full textDworkin, Morris. Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption. National Institute of Standards and Technology, 2016. http://dx.doi.org/10.6028/nist.sp.800-38g.
Full text