Journal articles on the topic 'Block cipher modes of operation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Block cipher modes of operation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Nawaz, Yasir, and Lei Wang. "Block Cipher in the Ideal Cipher Model: A Dedicated Permutation Modeled as a Black-Box Public Random Permutation." Symmetry 11, no. 12 (2019): 1485. http://dx.doi.org/10.3390/sym11121485.
Full textStallings, William. "NIST Block Cipher Modes of Operation for Confidentiality." Cryptologia 34, no. 2 (2010): 163–75. http://dx.doi.org/10.1080/01611190903185401.
Full textGagné, Martin, Pascal Lafourcade, Yassine Lakhnech, and Reihaneh Safavi-Naini. "Automated Proofs of Block Cipher Modes of Operation." Journal of Automated Reasoning 56, no. 1 (2015): 49–94. http://dx.doi.org/10.1007/s10817-015-9341-5.
Full textWang, Bin, Ju Long Lan, Yun Fei Guo, and Yuan Yang Zhang. "Design and Implementation of the Block Cipher-SMS4 IP Core." Advanced Materials Research 129-131 (August 2010): 881–85. http://dx.doi.org/10.4028/www.scientific.net/amr.129-131.881.
Full textAlzain, Mohammed. "Chaos Baker-based Image Encryption in Operation Modes." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 17, no. 1 (2018): 7153–63. http://dx.doi.org/10.24297/ijct.v17i1.7328.
Full textTsaregorodtsev, K. D. "Analysis of block cipher modes of operation for rfid devices." Prikladnaya diskretnaya matematika. Prilozhenie, no. 13 (September 1, 2020): 67–69. http://dx.doi.org/10.17223/2226308x/13/20.
Full textStallings, William. "NIST Block Cipher Modes of Operation for Authentication and Combined Confidentiality and Authentication." Cryptologia 34, no. 3 (2010): 225–35. http://dx.doi.org/10.1080/01611191003598295.
Full textSeo, Hwajeong, Hyunjun Kim, Kyungbae Jang, et al. "Secure HIGHT Implementation on ARM Processors." Mathematics 9, no. 9 (2021): 1044. http://dx.doi.org/10.3390/math9091044.
Full textKlyucharev, P. G. "On Statistical Testing of Block Ciphers." Mathematics and Mathematical Modeling, no. 5 (November 12, 2018): 35–56. http://dx.doi.org/10.24108/mathm.0518.0000132.
Full textMehran, Narges, and Mohammad Reza Khayyambashi. "Performance Evaluation of Authentication-Encryption and Confidentiality Block Cipher Modes of Operation on Digital Image." International Journal of Computer Network and Information Security 9, no. 9 (2017): 30–37. http://dx.doi.org/10.5815/ijcnis.2017.09.04.
Full textPhuc, Tran, and Changhoon Lee. "Cryptanalysis on SDDO-Based BM123-64 Designs Suitable for Various IoT Application Targets." Symmetry 10, no. 8 (2018): 353. http://dx.doi.org/10.3390/sym10080353.
Full textSarkar, Palash. "Pseudo-Random Functions and Parallelizable Modes of Operations of a Block Cipher." IEEE Transactions on Information Theory 56, no. 8 (2010): 4025–37. http://dx.doi.org/10.1109/tit.2010.2050921.
Full textSeo, Hwajeong, Hyeokdong Kwon, Hyunji Kim, and Jaehoon Park. "ACE: ARIA-CTR Encryption for Low-End Embedded Processors." Sensors 20, no. 13 (2020): 3788. http://dx.doi.org/10.3390/s20133788.
Full textKim, Yoonjeong, and Kang Yi. "Safety Comparison Analysis Against Known/Chosen Plaintext Attack of RBF (Random Block Feedback) Mode to Other Block Cipher Modes of Operation." Journal of Korea Information and Communications Society 39B, no. 5 (2014): 317–22. http://dx.doi.org/10.7840/kics.2014.39b.5.317.
Full textChakraborty, Debrup, and Palash Sarkar. "On modes of operations of a block cipher for authentication and authenticated encryption." Cryptography and Communications 8, no. 4 (2015): 455–511. http://dx.doi.org/10.1007/s12095-015-0153-6.
Full textSasongko, Arif, I. M. Narendra Kumara, Arief Wicaksana, Frédéric Rousseau, and Olivier Muller. "Hardware Context Switch-based Cryptographic Accelerator for Handling Multiple Streams." ACM Transactions on Reconfigurable Technology and Systems 14, no. 3 (2021): 1–25. http://dx.doi.org/10.1145/3460941.
Full textKim, Dong-Hyeon, and Kyung-Wook Shin. "An Efficient Hardware Implementation of ARIA Block Cipher Algorithm Supporting Four Modes of Operation and Three Master Key Lengths." Journal of the Korean Institute of Information and Communication Engineering 16, no. 11 (2012): 2517–24. http://dx.doi.org/10.6109/jkiice.2012.16.11.2517.
Full textZhang, Xiaoqiang, and Xuesong Wang. "Multiple-Image Encryption Algorithm Based on the 3D Permutation Model and Chaotic System." Symmetry 10, no. 11 (2018): 660. http://dx.doi.org/10.3390/sym10110660.
Full textHameed, Mustafa Emad, Masrullizam Mat Ibrahim, Nurulfajar Abd Manap, and Mothana L. Attiah. "Comparative study of several operation modes of AES algorithm for encryption ECG biomedical signal." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 6 (2019): 4850. http://dx.doi.org/10.11591/ijece.v9i6.pp4850-4859.
Full textSzalachowski, P., B. Ksiezopolski, and Z. Kotulski. "CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks." Information Processing Letters 110, no. 7 (2010): 247–51. http://dx.doi.org/10.1016/j.ipl.2010.01.004.
Full textHong, Deukjo, Seokhie Hong, Wonil Lee, et al. "Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers." Journal of Cryptology 19, no. 4 (2006): 441–62. http://dx.doi.org/10.1007/s00145-006-0205-3.
Full textBelyaev, Sergey, Marina Budko, Mikhail Budko, Alexei Guirik, and Vladimir Grozov. "Development of a Pseudo-Random Sequence Generation Function Based on the “Kuznechik” Cryptographic Algorithm." Voprosy kiberbezopasnosti, no. 4(44) (2021): 25–34. http://dx.doi.org/10.21681/2311-3456-2021-4-25-34.
Full textGalchenko, Andrii, and Serhii Choporov. "Block cipher modes in the deniable encryption." Visnyk of Zaporizhzhya National University. Physical and Mathematical Sciences, no. 1 (2019): 146–53. http://dx.doi.org/10.26661/2413-6549-2019-1-18.
Full textKoveshnikov, I. "Block cipher mode of operation possibilities of paralleling." NEW UNIVERSITY: TECHNICAL SCIENCES, no. 3-4 (March 30, 2014): 90–92. http://dx.doi.org/10.15350/2221-9552.2014.3-4.00038.
Full textJinkeun Hong. "Probabilistic Error Analysis of Operation Mode in Block Cipher." International Journal of Advancements in Computing Technology 5, no. 11 (2013): 377–83. http://dx.doi.org/10.4156/ijact.vol5.issue11.45.
Full textLombu, Dafirius, Siska Dame Tarihoran, and Irwan Gulo. "Kombinasi Mode Cipher Block Chaining Dengan Algoritma Triangle Chain Cipher Pada Penyandian Login Website." J-SAKTI (Jurnal Sains Komputer dan Informatika) 2, no. 1 (2018): 1. http://dx.doi.org/10.30645/j-sakti.v2i1.51.
Full textLu, Jiqiang, and Hwajung Seo. "A Key Selected S-Box Mechanism and Its Investigation in Modern Block Cipher Design." Security and Communication Networks 2020 (May 26, 2020): 1–26. http://dx.doi.org/10.1155/2020/1457419.
Full textArulkarthick, Dr V. J. "High-performance Block Cipher Using Flexible Architecture." International Academic Journal of Science and Engineering 6, no. 1 (2021): 188–93. http://dx.doi.org/10.9756/iajse/v6i1/1910019.
Full textHIROSE, Shoichi, and Hidenori KUWAKADO. "Efficient Pseudorandom-Function Modes of a Block-Cipher-Based Hash Function." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E92-A, no. 10 (2009): 2447–53. http://dx.doi.org/10.1587/transfun.e92.a.2447.
Full textAlabaichi, Ashwak Mahmood, Ramlan Mahmood, Faudziah Ahmad, and Mohammed S. Mechee. "Randomness Analysis on Blowfish Block Cipher Using ECB and CBC Modes." Journal of Applied Sciences 13, no. 6 (2013): 768–89. http://dx.doi.org/10.3923/jas.2013.768.789.
Full textZhang, Pei, and Wenying Zhang. "Differential Cryptanalysis on Block Cipher Skinny with MILP Program." Security and Communication Networks 2018 (October 4, 2018): 1–11. http://dx.doi.org/10.1155/2018/3780407.
Full textChakraborty, Debrup, and Palash Sarkar. "A General Construction of Tweakable Block Ciphers and Different Modes of Operations." IEEE Transactions on Information Theory 54, no. 5 (2008): 1991–2006. http://dx.doi.org/10.1109/tit.2008.920247.
Full textWang, Hai Yan. "Wireless Sensor Networks Based on a New Block Encryption Algorithm." Applied Mechanics and Materials 551 (May 2014): 454–59. http://dx.doi.org/10.4028/www.scientific.net/amm.551.454.
Full textYANG Feng, ZHONG Cheng, and LU Danhua. "A Novel Block-Cipher Operation Mode for Multi core Message Authentication." International Journal of Advancements in Computing Technology 4, no. 7 (2012): 195–202. http://dx.doi.org/10.4156/ijact.vol4.issue7.22.
Full textFauzan, Abd Charis, and Veradella Yuelisa Mafula. "Increasing Complexity of Cryptographic Using Combination of Hill Cipher and Cipher Block Chaining." Journal of Development Research 4, no. 2 (2020): 92–97. http://dx.doi.org/10.28926/jdr.v4i2.124.
Full textQahur Al Mahri, Hassan, Leonie Simpson, Harry Bartlett, Ed Dawson, and Kenneth Koon-Ho Wong. "A fundamental flaw in the ++AE authenticated encryption mode." Journal of Mathematical Cryptology 12, no. 1 (2018): 37–42. http://dx.doi.org/10.1515/jmc-2016-0037.
Full textStallings, William. "The offset codebook (OCB) block cipher mode of operation for authenticated encryption." Cryptologia 42, no. 2 (2018): 135–45. http://dx.doi.org/10.1080/01611194.2017.1422048.
Full textWang, Xing-Yuan, and Zhi-Ming Li. "A Stream/Block Combination Image Encryption Algorithm Using Logistic Matrix to Scramble." International Journal of Nonlinear Sciences and Numerical Simulation 20, no. 2 (2019): 167–77. http://dx.doi.org/10.1515/ijnsns-2018-0027.
Full textAkhmetzyanova, L. R., Evgeny Konstantinovich Alekseev, Grigory K. Sedov, Ekaterina Sergeevna Smyshlyaeva, and Stanislav Vital'evich Smyshlyaev. "Practical significance of security bounds for standardized internally re-keyed block cipher modes." Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography] 10, no. 2 (2019): 31–46. http://dx.doi.org/10.4213/mvk282.
Full textAbidi, Abdessalem, Qianxue Wang, Belgacem Bouallegue, Mohsen Machhout, and Christophe Guyeux. "Proving Chaotic Behavior of CBC Mode of Operation." International Journal of Bifurcation and Chaos 26, no. 07 (2016): 1650113. http://dx.doi.org/10.1142/s0218127416501133.
Full textDehnavi, Seyed. "Further Observations on SIMON and SPECK Block Cipher Families." Cryptography 3, no. 1 (2018): 1. http://dx.doi.org/10.3390/cryptography3010001.
Full textAerabi, Ehsan, David Hély, Cyril Bresch, Athanasios Papadimitriou, and Mahdi Fazeli. "CONFISCA: An SIMD-Based Concurrent FI and SCA Countermeasure with Switchable Performance and Security Modes." Cryptography 5, no. 2 (2021): 13. http://dx.doi.org/10.3390/cryptography5020013.
Full textAn, SangWoo, and Seog Chung Seo. "Highly Efficient Implementation of Block Ciphers on Graphic Processing Units for Massively Large Data." Applied Sciences 10, no. 11 (2020): 3711. http://dx.doi.org/10.3390/app10113711.
Full textZhang, Ping, and Qian Yuan. "Minimizing Key Materials: The Even–Mansour Cipher Revisited and Its Application to Lightweight Authenticated Encryption." Security and Communication Networks 2020 (March 10, 2020): 1–6. http://dx.doi.org/10.1155/2020/4180139.
Full textKwon, Hyeokdong, SangWoo An, YoungBeom Kim, et al. "Designing a CHAM Block Cipher on Low-End Microcontrollers for Internet of Things." Electronics 9, no. 9 (2020): 1548. http://dx.doi.org/10.3390/electronics9091548.
Full textHuang, Chi-Wu, Hong-You Chen, Hsing-Chang Yeh, and Chi-Jeng Chang. "Block RAM Based Design of 8-bit AES Operation Modes." Procedia Engineering 29 (2012): 2848–52. http://dx.doi.org/10.1016/j.proeng.2012.01.402.
Full textGórska, Małgorzata, and Jarosław Molendowski. "Experimental use of selected steganographic and crypto-graphic algorithms - laboratory workstation." AUTOBUSY – Technika, Eksploatacja, Systemy Transportowe 24, no. 6 (2019): 168–73. http://dx.doi.org/10.24136/atest.2019.145.
Full textneetha, CH Su, D. Sravana Kumar, P. Siri sha, and KM San deep. "Security and Authentication Architecture of block cipher using Mathematical operation and one-way hash function." International Journal of Mathematics Trends and Technology 49, no. 4 (2017): 226–31. http://dx.doi.org/10.14445/22315373/ijmtt-v49p533.
Full textSeo, Hwajeong, Hyunjun Kim, Kyoungbae Jang, et al. "Compact Implementation of ARIA on 16-Bit MSP430 and 32-Bit ARM Cortex-M3 Microcontrollers." Electronics 10, no. 8 (2021): 908. http://dx.doi.org/10.3390/electronics10080908.
Full textAl-qdah, Majdi. "A Hybrid Security System Based on Bit Rotation and Chaotic Maps." Current Signal Transduction Therapy 14, no. 2 (2019): 152–57. http://dx.doi.org/10.2174/1574362413666180813113001.
Full text