Journal articles on the topic 'Block cipher'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Block cipher.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Bucholc, Krzysztof, Krzysztof Chmiel, Anna Grocholewska-Czuryło, Ewa Idzikowska, Izabela Janicka-Lipska, and Janusz Stokłosa. "Scalable PP-1 block cipher." International Journal of Applied Mathematics and Computer Science 20, no. 2 (2010): 401–11. http://dx.doi.org/10.2478/v10006-010-0030-6.
Full textSayyed, Karishma Shaukat, Prof S. R. Ganolkar, and Prof S. O. Rajankar. "FPGA Implementation of Rectangle Lightweight Block Cipher." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (2022): 2426–33. http://dx.doi.org/10.22214/ijraset.2022.42143.
Full textGáll, József, Pinar Gürgez, and Géza Horváth. "Adding an Avalanche Effect to a Stream Cipher Suitable for IoT Devices." Electronics 14, no. 13 (2025): 2546. https://doi.org/10.3390/electronics14132546.
Full textHaryono, Wasis. "Comparison Encryption of How to Work Caesar Cipher, Hill Cipher, Blowfish and Twofish." Data Science: Journal of Computing and Applied Informatics 4, no. 2 (2020): 100–110. http://dx.doi.org/10.32734/jocai.v4.i2-4004.
Full textJang, Kyungbae, Gyeongju Song, Hyunjun Kim, Hyeokdong Kwon, Hyunji Kim, and Hwajeong Seo. "Efficient Implementation of PRESENT and GIFT on Quantum Computers." Applied Sciences 11, no. 11 (2021): 4776. http://dx.doi.org/10.3390/app11114776.
Full textGusmanova, F. R., and G. A. Abdulkarimova. "OVERVIEW OF THE BLOCK ENCRYPTION DEVELOPMENT." BULLETIN Series of Physics & Mathematical Sciences 69, no. 1 (2020): 295–301. http://dx.doi.org/10.51889/2020-1.1728-7901.52.
Full textNawaz, Yasir, and Lei Wang. "Block Cipher in the Ideal Cipher Model: A Dedicated Permutation Modeled as a Black-Box Public Random Permutation." Symmetry 11, no. 12 (2019): 1485. http://dx.doi.org/10.3390/sym11121485.
Full textKim, Bohun, Junghoon Cho, Byungjun Choi, Jongsun Park, and Hwajeong Seo. "Compact Implementations of HIGHT Block Cipher on IoT Platforms." Security and Communication Networks 2019 (December 31, 2019): 1–10. http://dx.doi.org/10.1155/2019/5323578.
Full textGhorai, Shreyasi, Nilanjan Datta, and Mrinal Nandi. "ULBC: An Ultra Light-weight Block Cipher." Journal of Advances in Mathematics and Computer Science 38, no. 8 (2023): 86–100. http://dx.doi.org/10.9734/jamcs/2023/v38i81793.
Full textHieu, Minh Nguyen, Duy Ho Ngoc, Canh Hoang Ngoc, Trung Dinh Phuong, and Manh Tran Cong. "New primitives of controlled elements F2/4 for block ciphers." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 5 (2020): 5470. http://dx.doi.org/10.11591/ijece.v10i5.pp5470-5478.
Full textMinh, Nguyen Hieu, Ho Ngoc Duy, Hoang Ngoc Canh, Dinh Phuong Trung, and Tran Cong Manh. "New primitives of controlled elements F2/4 for block ciphers." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 5 (2020): 5470–78. https://doi.org/10.11591/ijece.v10i5.pp5470-5478.
Full textLuo, Lan, Qiong Hai Dai, Chun Xiang Xu, and Shao Quan Jiang. "An Application Study to the Ciphers Weighed in Faithful Transmission." Applied Mechanics and Materials 128-129 (October 2011): 637–41. http://dx.doi.org/10.4028/www.scientific.net/amm.128-129.637.
Full textTran Thi, Luong. "PROVING THE SECURITY OF AES BLOCK CIPHER BASED ON MODIFIED MIXCOLUMN." Journal of Computer Science and Cybernetics 40, no. 2 (2024): 187–203. http://dx.doi.org/10.15625/1813-9663/18058.
Full textKuo-Tsang, Huang, Chiu Jung-Hui, and Shen Sung-Shiou. "A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS." International Journal of Network Security & Its Applications (IJNSA) 5, no. 1 (2013): 17–36. https://doi.org/10.5281/zenodo.3786423.
Full textJang, Kyungbae, Gyeongju Song, Hyeokdong Kwon, et al. "Grover on PIPO." Electronics 10, no. 10 (2021): 1194. http://dx.doi.org/10.3390/electronics10101194.
Full textEum, Siwoo, Hyunjun Kim, Hyeokdong Kwon, Minjoo Sim, Gyeongju Song, and Hwajeong Seo. "Parallel Implementations of ARIA on ARM Processors and Graphics Processing Unit." Applied Sciences 12, no. 23 (2022): 12246. http://dx.doi.org/10.3390/app122312246.
Full textSahu, Harish Kumar, Vikas Jadhav, Shefali Sonavane, and R. K. Sharma. "Cryptanalytic Attacks on IDEA Block Cipher." Defence Science Journal 66, no. 6 (2016): 582. http://dx.doi.org/10.14429/dsj.66.10798.
Full textSreeja and Kumar Sharma Mohit. "Advanced Encryption Standard (AES) and Hill Cipher: A Comparative Study." International Journal of Innovative Science and Research Technology 7, no. 12 (2023): 1983–85. https://doi.org/10.5281/zenodo.7553080.
Full textMatheis, Kenneth, Rainer Steinwandt, and Adriana Suárez Suárez Corona. "Algebraic Properties of the Block Cipher DESL." Symmetry 11, no. 11 (2019): 1411. http://dx.doi.org/10.3390/sym11111411.
Full textVetrivel, K., and S. P. Shantharajah. "A Study of Distinguisher Attack on AES-128 and AES-256 Block Ciphers through Model Based Classification Using Neural Network." Applied Mechanics and Materials 710 (January 2015): 133–38. http://dx.doi.org/10.4028/www.scientific.net/amm.710.133.
Full textKurniawan, Yusuf, and Muhammad Adli Rizqulloh. "Block cipher four implementation on field programmable gate array." Communications in Science and Technology 5, no. 2 (2020): 53–64. http://dx.doi.org/10.21924/cst.5.2.2020.184.
Full textOstia, Mary Grace, Alessa Crisostomo, David Jhozel Lucas, et al. "An Enhancement of Text Encryption Algorithm with Hybrid Two-Square Cipher and Columnar Transposition Cipher." International Journal of Computing Sciences Research 8 (January 1, 2024): 3202–16. https://doi.org/10.25147/ijcsr.2017.001.1.214.
Full textMohammad Shah, Isma Norshahila, Eddie Shahril Ismail, Faieza Samat, and Normahirah Nek Abd Rahman. "Modified Generalized Feistel Network Block Cipher for the Internet of Things." Symmetry 15, no. 4 (2023): 900. http://dx.doi.org/10.3390/sym15040900.
Full textKim, Hyunjun, Siwoo Eum, Wai-Kong Lee, Sokjoon Lee, and Hwajeong Seo. "Secure and Robust Internet of Things with High-Speed Implementation of PRESENT and GIFT Block Ciphers on GPU." Applied Sciences 12, no. 20 (2022): 10192. http://dx.doi.org/10.3390/app122010192.
Full textDwivedi, Ashutosh Dhar. "BRISK: Dynamic Encryption Based Cipher for Long Term Security." Sensors 21, no. 17 (2021): 5744. http://dx.doi.org/10.3390/s21175744.
Full textSajjad, Muhammad, Tariq Shah, Huda Alsaud, and Maha Alammari. "Designing pair of nonlinear components of a block cipher over quaternion integers." AIMS Mathematics 8, no. 9 (2023): 21089–105. http://dx.doi.org/10.3934/math.20231074.
Full textEid Khamees Al-Shammary, Mohammed, and Sufyan Salim Mahmood Al-Dabbagh. "Differential Distribution Table implementation DDT survey." Technium: Romanian Journal of Applied Sciences and Technology 4, no. 10 (2022): 15–30. http://dx.doi.org/10.47577/technium.v4i10.7700.
Full textLysytska, Iryna, Kostiantyn Lysytskyi, Oleksii Nariezhnii, and Tetiana Hrinenko. "The influence of S-boxes on the arrival of the cipher to the state of random substitution." Radioelectronic and Computer Systems, no. 3 (September 29, 2023): 150–58. http://dx.doi.org/10.32620/reks.2023.3.12.
Full textSakan, Kairat, Saule Nyssanbayeva, Nursulu Kapalova, Kunbolat Algazy, Ardabek Khompysh, and Dilmukhanbet Dyusenbayev. "Development and analysis of the new hashing algorithm based on block cipher." Eastern-European Journal of Enterprise Technologies 2, no. 9 (116) (2022): 60–73. http://dx.doi.org/10.15587/1729-4061.2022.252060.
Full textKairat, Sakan, Nyssanbayeva Saule, Kapalova Nursulu, Algazy Kunbolat, Khompysh Ardabek, and Dyusenbayev Dilmukhanbet. "Development and analysis of the new hashing algorithm based on block cipher." Eastern-European Journal of Enterprise Technologies 2, no. 9 (116) (2022): 60–73. https://doi.org/10.15587/1729-4061.2022.252060.
Full textZakaria, Abdul Alif, Azni Haslizan Ab Halim, Farida Ridzuan, Nur Hafiza Zakaria, and Maslina Daud. "LAO-3D: A Symmetric Lightweight Block Cipher Based on 3D Permutation for Mobile Encryption Application." Symmetry 14, no. 10 (2022): 2042. http://dx.doi.org/10.3390/sym14102042.
Full textWang, Bin, Ju Long Lan, Yun Fei Guo, and Yuan Yang Zhang. "Design and Implementation of the Block Cipher-SMS4 IP Core." Advanced Materials Research 129-131 (August 2010): 881–85. http://dx.doi.org/10.4028/www.scientific.net/amr.129-131.881.
Full textAhmed, Fatma, and Dalia H. Elkamchouchi. "A New Modified MARS Cryptosystem Based on Niho Exponent with an Enhanced S-Box Generation." Electronics 11, no. 15 (2022): 2318. http://dx.doi.org/10.3390/electronics11152318.
Full textKaidalov, Dmytro, Roman Oliynykov, and Oleksandr Kazymyrov. "A Method for Security Estimation of the Spn-Based Block Cipher Against Related-Key Attacks." Tatra Mountains Mathematical Publications 60, no. 1 (2014): 25–45. http://dx.doi.org/10.2478/tmmp-2014-0023.
Full textAntal, Eugen, and Viliam Hromada. "A NEW STREAM CIPHER BASED ON FIALKA M-125." Tatra Mountains Mathematical Publications 57, no. 1 (2013): 101–18. http://dx.doi.org/10.2478/tmmp-2013-0038.
Full textSiji, M. "Analysis and Implementation of the Ultra-Lightweight Block Cipher: PRESENT." Journal of VLSI Design and its Advancement 3, no. 1 (2020): 1–8. https://doi.org/10.5281/zenodo.3706620.
Full textDing, Linxi, Hongxin Zhang, Jun Xu, Xing Fang, and Yejing Wu. "Differential Fault and Algebraic Equation Combined Analysis on PICO." Mathematics 12, no. 5 (2024): 700. http://dx.doi.org/10.3390/math12050700.
Full textPrihandoko, Antonius Cahya, Yudha Alif Auliya, Diksy Media Firmansyah, and S. Slamin. "Randomness of encryption keys generated by super H-antimagic total labeling." Indonesian Journal of Combinatorics 4, no. 1 (2020): 21. http://dx.doi.org/10.19184/ijc.2020.4.1.3.
Full textHapifah Purba, Nurul. "Kombinasi Algoritma Cipher Block Chaining dan Triangle Chain Cipher dalam Penyandian File Text." Bulletin of Computer Science Research 2, no. 2 (2022): 47–52. http://dx.doi.org/10.47065/bulletincsr.v2i2.155.
Full textWang, Juan, and Qun Ding. "Dynamic Rounds Chaotic Block Cipher Based on Keyword Abstract Extraction." Entropy 20, no. 9 (2018): 693. http://dx.doi.org/10.3390/e20090693.
Full textG., Rekha, and Srinivas V. "A NOVEL APPROACH IN HILL CIPHER CRYPTOGRAPHY." INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTER RESEARCH 11, no. 06 (2023): 3503–5. https://doi.org/10.5281/zenodo.8095252.
Full textDindiene, Lina, Aleksejus Mihalkovich, Kestutis Luksys, and Eligijus Sakalauskas. "Matrix Power Function Based Block Cipher Operating in CBC Mode." Mathematics 10, no. 12 (2022): 2123. http://dx.doi.org/10.3390/math10122123.
Full textDawood, Omar A., Abdul Monem S. Rahma, and Abdul Mohsen J. Abdul Hossen. "The New Block Cipher Design (Tigris Cipher)." International Journal of Computer Network and Information Security 7, no. 12 (2015): 10–18. http://dx.doi.org/10.5815/ijcnis.2015.12.02.
Full textNajah, Maulidyah Lailatun, and Kiswara Agung Santoso. "KOMBINASI CAESAR CIPHER DAN REVERSE CIPHER BERDASARKAN CIPHER BLOCK CHAINING." Majalah Ilmiah Matematika dan Statistika 21, no. 2 (2021): 101. http://dx.doi.org/10.19184/mims.v21i2.26978.
Full textIshchukova, Evgenia, Ekaterina Maro, and Pavel Pristalov. "Algebraic Analysis of a Simplified Encryption Algorithm GOST R 34.12-2015." Computation 8, no. 2 (2020): 51. http://dx.doi.org/10.3390/computation8020051.
Full textIgarashi, Yasutaka, Shun Nakazawa, and Toshinobu Kaneko. "Differential Cryptanalysis of Block Cipher Halka." International Journal of Information and Electronics Engineering 10, no. 2 (2020): 40–43. http://dx.doi.org/10.18178/ijiee.2020.10.2.718.
Full textLuo, Yiyuan, and Xuejia Lai. "Improvements for Finding Impossible Differentials of Block Cipher Structures." Security and Communication Networks 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/5980251.
Full textLu, Bin, Yu Chen Li, and Fen Lin Liu. "A Genenral Feistal Structure Based Color Image Encryption Algorithm." Applied Mechanics and Materials 742 (March 2015): 294–98. http://dx.doi.org/10.4028/www.scientific.net/amm.742.294.
Full textFauzi, Rizky Restu, and Theophilus Wellem. "Perancangan Kriptografi Block Cipher berbasis Pola Dribbling Practice." AITI 18, no. 2 (2021): 158–72. http://dx.doi.org/10.24246/aiti.v18i2.158-172.
Full textSiregar, Salman. "Implementasi Mode Operasi Cipher Block Chaining (CBC) Untuk Mengoptimalkan Algoritma Affine Cipher Dalam Pengamanan Data." Bulletin of Information System Research 1, no. 3 (2023): 99–109. https://doi.org/10.62866/bios.v1i3.28.
Full text