Academic literature on the topic 'CBC mode'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'CBC mode.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "CBC mode"

1

Chang, Kai-Chun, You-Tun Teng, and Wen-Long Chin. "High-Throughput CBC Mode Crypto Circuit." Electrical Science & Engineering 5, no. 1 (2023): 20–30. http://dx.doi.org/10.30564/ese.v5i1.5636.

Full text
Abstract:
The objective of this study is to investigate a high-throughput cipher-block chaining (CBC) mode crypto circuit, which can be embedded in commercial home gateways or switches/routers. Concurrently, the area efficiency of block ciphers can be improved as well. However, the CBC mode encounters the problem of data dependency. To solve this issue, a data scheduling mechanism of network packets is proposed to eliminate the data dependency of input data for CBC mode pipelined crypto engines. The proposed CBC mode architecture can be applied to advanced encryption standards (AES), triple data encrypt
APA, Harvard, Vancouver, ISO, and other styles
2

Tan, Cheng, Xiaoyan Deng, and Lijun Zhang. "Identification of Block Ciphers under CBC Mode." Procedia Computer Science 131 (2018): 65–71. http://dx.doi.org/10.1016/j.procs.2018.04.186.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Alslman, Yasmeen Shaher, Ashraf Ahmad, and Yousef AbuHour. "Enhanced and authenticated cipher block chaining mode." Bulletin of Electrical Engineering and Informatics 12, no. 4 (2023): 2357–62. http://dx.doi.org/10.11591/beei.v12i4.5113.

Full text
Abstract:
Due to the increased attacks on different applications, data security has become crucial. Many modes can be used to operate the advanced encryption standard (AES), some of which provide integrity, and some outperform other modes in security and simplicity. In this paper, the chain block cipher (CBC) mode has been modified to provide more security to the encrypted data by making it robust against the bit-flipping attack and adding an integrity approach using the keyedhash function. In addition, using the keyd-hash function increases the number of keys needed in CBC-AES to two keys, and this can
APA, Harvard, Vancouver, ISO, and other styles
4

Alslman, Yasmeen Shaher, Ashraf Ahmad, and Yousef AbuHour. "Enhanced and authenticated cipher block chaining mode." Bulletin of Electrical Engineering and Informatics 12, no. 4 (2023): 2357–62. http://dx.doi.org/10.11591/eei.v12i4.5113.

Full text
Abstract:
Due to the increased attacks on different applications, data security has become crucial. Many modes can be used to operate the advanced encryption standard (AES), some of which provide integrity, and some outperform other modes in security and simplicity. In this paper, the chain block cipher (CBC) mode has been modified to provide more security to the encrypted data by making it robust against the bit-flipping attack and adding an integrity approach using the keyedhash function. In addition, using the keyd-hash function increases the number of keys needed in CBC-AES to two keys, and this can
APA, Harvard, Vancouver, ISO, and other styles
5

Abidi, Abdessalem, Qianxue Wang, Belgacem Bouallegue, Mohsen Machhout, and Christophe Guyeux. "Proving Chaotic Behavior of CBC Mode of Operation." International Journal of Bifurcation and Chaos 26, no. 07 (2016): 1650113. http://dx.doi.org/10.1142/s0218127416501133.

Full text
Abstract:
The cipher block chaining (CBC) mode of operation was invented by IBM (International Business Machine) in 1976. It presents a very popular way of encrypting that is used in various applications. In this paper, we have mathematically proven that, under some conditions, the CBC mode of operation can admit a chaotic behavior according to Devaney. Some cases will be properly studied in order to provide evidence for this idea.
APA, Harvard, Vancouver, ISO, and other styles
6

Rizky, Putri Alifia, Sopian Soim, and Sholihin Sholihin. "Implementasi Algoritma Kriptografi AES CBC Untuk Keamanan Komunikasi Data Pada Hardware." Jurnal RESISTOR (Rekayasa Sistem Komputer) 7, no. 2 (2024): 71–78. https://doi.org/10.31598/jurnalresistor.v7i2.1650.

Full text
Abstract:
Perkembangan teknologi informasi semakin berkembang dengan pesat, keamanan komunikasi data menjadi sangat penting. Penelitian ini mengembangkan algoritma kriptografi Advanced Encryption Standard (AES) dengan mode operasi Cipher Block Chaining (CBC) untuk meningkatkan keamanan komunikasi data. Tujuannya adalah menghasilkan algoritma AES-CBC yang lebih efektif dan efisien dalam melindungi data. Metode penelitian meliputi studi literatur, perancangan perangkat keras dan lunak, integrasi sistem, pengujian, pengambilan data, dan analisis. Implementasi dilakukan pada perangkat keras berbasis Arduino
APA, Harvard, Vancouver, ISO, and other styles
7

Antariksa, Feillyan Alfreda. "Ransomware Attack using AES Encryption on ECB, CBC and CFB Mode." Jurnal Ilmu Komputer 12, no. 1 (2019): 8. http://dx.doi.org/10.24843/jik.2019.v12.i01.p06.

Full text
Abstract:
With the help of internet, users are faster getting data that they needed. It’s possible that villain insert an evil program (malware) without user knowing it. One of the malwares that spread like a plague right now is ransomware. The infected computer system will encrypt all files on the computer and blackmail the users to pay some money if you want to access back your files. For this experiment it’s using 2 approach, first is using online attack and second is offline attack. Ransomware in this experiment is using AES 256 for encrypting the files and using ECB, CBC and CFB mode for comparing
APA, Harvard, Vancouver, ISO, and other styles
8

Hwang, Seongjin, and Changhoon Lee. "Padding Oracle Attack on Block Cipher with CBC|CBC-Double Mode of Operation using the BOZ-PAD." Journal of Society for e-Business Studies 20, no. 1 (2015): 89–97. http://dx.doi.org/10.7838/jsebs.2015.20.1.089.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Aliyah, Jannatun. "APLIKASI MOBILE UNTUK ENKRIPSI DATA GAMBAR MENGGUNAKAN KOMBINASI FUNGSI XOR DAN MODE OPERASI CBC." Jurnal Informatika, Teknologi dan Sains 2, no. 4 (2020): 214–22. http://dx.doi.org/10.51401/jinteks.v2i4.824.

Full text
Abstract:
Dalam tulisan ini memaparkan pembuatan aplikasi kriptografi dan mengimplementasikan model enkripsi pada datagambar. Tujuannya untuk keamanan pada penyimpanan file gambar. Proses enkripsi pada gambar akan menghasilkan hasilenkripsi yang dapat merahasiakan gambar. Sebaliknya, proses dekripsi akan mengembalikan gambar yang dirahasiakantersebut kembali menjadi gambar aslinya. Metode yang digunakan dalam enkripsi dan dekripsi data gambar ini adalahkombinasi fungsi XOR dan mode operasi CBC (chipherblock Chaining). Dimana enkripsi yang dilakukan pertama kali denganfungsi XOR kemudian dilanjutkan deng
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Jiajian, Shuai Cao, and Erol Yilmaz. "Characterization of Macro Mechanical Properties and Microstructures of Cement-Based Composites Prepared from Fly Ash, Gypsum and Steel Slag." Minerals 12, no. 1 (2021): 6. http://dx.doi.org/10.3390/min12010006.

Full text
Abstract:
Using solid wastes (SWs) as backfilling material to fill underground mined-out areas (UMOAs) solved the environmental problems caused by SWs and reduced the backfilling cost. In this study, fly ash (FA), gypsum and steel slag (SS) were used to prepare cement-based composites (CBC). The uniaxial compression, computed tomography (CT) and scanning electron microscope (SEM) laboratory experiments were conducted to explore the macro and micromechanical properties of CBC. The findings showed that the uniaxial compressive strength (UCS) of CBC with a curing time of 7 d could reach 6.54 MPa. The incre
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "CBC mode"

1

Yau, Arnold K. L. "Side channel analyses of CBC mode encryption." Thesis, University of London, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.537515.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Watson, Gaven James. "Provable security in practice : Analysis of SSH and CBC mode with padding." Thesis, Royal Holloway, University of London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.530797.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Natter, Martin, and Markus Feurstein. "Correcting for CBC model bias. A hybrid scanner data - conjoint model." SFB Adaptive Information Systems and Modelling in Economics and Management Science, WU Vienna University of Economics and Business, 2001. http://epub.wu.ac.at/880/1/document.pdf.

Full text
Abstract:
Choice-Based Conjoint (CBC) models are often used for pricing decisions, especially when scanner data models cannot be applied. Up to date, it is unclear how Choice-Based Conjoint (CBC) models perform in terms of forecasting real-world shop data. In this contribution, we measure the performance of a Latent Class CBC model not by means of an experimental hold-out sample but via aggregate scanner data. We find that the CBC model does not accurately predict real-world market shares, thus leading to wrong pricing decisions. In order to improve its forecasting performance, we propose a correction s
APA, Harvard, Vancouver, ISO, and other styles
4

Kelur, Ashok. "Model checking of multicore software using CBMC." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-182169.

Full text
Abstract:
Computers have been key subsystems in various complex systems. As computers are adapted into various fields, hardware and software are increasing in size and complexity. It is evident that parallel computing is the way to solve large scale complex information technology problems. Engineers designing hardware and software are required to verify the system for correctness. As system's size and complexity increases, it is difficult to perform manual system verification. Model checking converts a hardware or software solution into temporal logic and uses solvers to assert on properties of solution
APA, Harvard, Vancouver, ISO, and other styles
5

Loock, Marianne. "CBAC – a model for conflict-based access control." Thesis, University of Pretoria, 2012. http://hdl.handle.net/2263/25423.

Full text
Abstract:
Organisations that seek a competitive advantage cannot afford to compromise their brand reputation or expose it to disrepute. When employees leek information, it is not only the breach of confidentiality that is a problem, but it also causes a major brand reputation problem for the organisation. Any possible breach of confidentiality should be minimised by implementing adequate security within the organisation and among its employees. An important issue to address is the development of suitable access control models that are able to restrict access not only to unauthorised data sets, but also
APA, Harvard, Vancouver, ISO, and other styles
6

Claeson, Holmgren Mathilda, and Tilda Göransson. "Cirkulär ekonomi på mikronivå : En fallstudie om hur ett mikroföretag imodebranchen kan agera för att sluta kretsloppet." Thesis, Högskolan i Borås, Akademin för textil, teknik och ekonomi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-14768.

Full text
Abstract:
I Sverige är 93% av alla existerande företag i mikrostorlek. Trots det finns det väldigt lite forskning på hur de ska gå tillväga för att implementera en cirkulär affärsmodell. Syftet med studien är att undersöka vilka förutsättningarna ett modeföretag i mikrostorlek kan ha för att implementera cirkulära affärsmodeller.   Dagens ekonomiska system bygger på linjära affärsmodeller. Det betyder att människor köper, använder och sedan slänger produkter som fortfarande har ett potentiellt ekonomiskt värde. Cirkulära affärsmodeller utgör ett alternativ till dagens ekonomiska system. Det bygger på at
APA, Harvard, Vancouver, ISO, and other styles
7

de, Siqueira Teles Fabrício. "Towards Model-Driven Engineering Constraint-Based Scheduling Applications." Universidade Federal de Pernambuco, 2008. https://repositorio.ufpe.br/handle/123456789/2348.

Full text
Abstract:
Made available in DSpace on 2014-06-12T15:57:08Z (GMT). No. of bitstreams: 2 arquivo3142_1.pdf: 2136149 bytes, checksum: 9584d05181d7f6e862c757ce418c8701 (MD5) license.txt: 1748 bytes, checksum: 8a4605be74aa9ea9d79846c1fba20a33 (MD5) Previous issue date: 2008<br>de Siqueira Teles, Fabrício; Pierre Louis Robin, Jacques. Towards Model-Driven Engineering Constraint-Based Scheduling Applications. 2008. Dissertação (Mestrado). Programa de Pós-Graduação em Ciência da Computação, Universidade Federal de Pernambuco, Recife, 2008.
APA, Harvard, Vancouver, ISO, and other styles
8

Kördel, Mikael. "A Physical X-Ray Scintillator Detector Model for CBCT Imaging Applications." Thesis, KTH, Medicinsk bildfysik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-147690.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

au, cplottke@fizzy murdoch edu, and Christopher Martin Plottke. "S-wave model in electron-atom collisions." Murdoch University, 2004. http://wwwlib.murdoch.edu.au/adt/browse/view/adt-MU20040818.111937.

Full text
Abstract:
This thesis discusses the theory and presents the numerical solution of the S-wave models of electron-hydrogen and electron-helium scattering. The Convergent Close-Coupling (CCC) method is used to obtain the numerical results. The focus within the electron-hydrogen S-wave model is to investigate cross section results for scattering from excited states; in particular, the elastic free-free transitions. These contain a divergent potential matrix element as the first term. The investigation of the electron-helium S-wave model is split into two sections, firstly applying the Frozen-Core approximat
APA, Harvard, Vancouver, ISO, and other styles
10

Marques, Daniel Ruivo. "The hyperarousal hypothesis in psychophysiological insomnia: study of default-mode network and its modification after CBT." Doctoral thesis, Universidade de Aveiro, 2016. http://hdl.handle.net/10773/16787.

Full text
Abstract:
Doutoramento em Psicologia<br>A insónia primária é a perturbação do comportamento de sono mais prevalente quer na população clínica quer na comunidade. Uma das formas mais comuns é a insónia psicofisiológica (IP). A hiperativação neuropsicofisiológica, afetiva, cognitiva e comportamental assim como o condicionamento mal-adaptativo entre estímulos associados ao sono e à cama com estímulos indutores de ativação são duas das características mais diferenciadoras desta patologia. Tendo por base a importância que esta perturbação assume em termos de saúde pública, levou-se a cabo 4 estudos empíricos
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "CBC mode"

1

Ravagnan, Luigi, and Giordano Balestrazzi. Falso in bilancio: Reato di moda : riflessioni sull'articolo 2621 c.c. Corbo, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Yiding. Canonical analysis of oil data and pH model building for CBM. National Library of Canada, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yan, Gao. Application of DPCA to oil data pH model building and comparison of optimal CBM policies. National Library of Canada, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rostikawati, Rin. Model pemberdayaan perempuan korban kekerasan melalui pendekatan community based crisis center (CBCC): Laporan hibah kompetitif penelitian sesuai prioritas nasional. Universitas Jenderal Soedirman, Fakultas Ilmu Sosial dan Ilmu Politik, Jurusan Sosiologi, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pettis, D. L. Birmingham: a study in the effects of the CBD-focussed model of regeneration on the residents in the inner core of the city. Oxford Brookes University, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Centro de Arte Contemporáneo de Málaga and Málaga (Spain) Ayuntamiento, eds. William Kentridge: ¿no se unirá usted al baile? : CAC Málaga, Centro de Arte Contemporáneo de Málaga, 14 febrero-13 mayo 2012, 14 February-13 May 2012. CAC Málaga, Centro de Arte Contemporáneo de Málaga, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Martin, Keith M. Data Integrity. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0006.

Full text
Abstract:
This chapter discusses cryptographic mechanisms for providing data integrity. We begin by identifying different levels of data integrity that can be provided. We then look in detail at hash functions, explaining the different security properties that they have, as well as presenting several different applications of a hash function. We then look at hash function design and illustrate this by discussing the hash function SHA-3. Next, we discuss message authentication codes (MACs), presenting a basic model and discussing basic properties. We compare two different MAC constructions, CBC-MAC and H
APA, Harvard, Vancouver, ISO, and other styles
8

Lesorogol, Carolyn K. Conservation and Community in Kenya. The Rowman & Littlefield Publishing Group, 2022. https://doi.org/10.5040/9781666986761.

Full text
Abstract:
Community-based wildlife conservation is promoted as a win-win solution for wildlife and people that protects biodiversity while improving the economic status of communities living among wildlife. This book, based on mixed-method anthropological research conducted in Samburu County, Kenya, demonstrates that, counter to simple narratives promising benefits, community-based wildlife conservancies (CBCs) are complex social institutions layered on pre-existing land use practices with differential impacts for members. Through in-depth research in three communities, Carolyn K. Lesorogol explains how
APA, Harvard, Vancouver, ISO, and other styles
9

Han, Shihui. A culture–behavior–brain-loop model of human development. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780198743194.003.0008.

Full text
Abstract:
Chapter 8 introduces a culture–behavior–brain (CBB)-loop model of human development based on cultural neuroscience findings, and proposes a new framework for understanding human development regarding both human phylogeny and lifespan ontogeny. This model posits that culture shapes the brain by contextualizing behavior, and the brain fits and modifies culture via behavioral influences. Genes provide a fundamental basis for and interact with the CBB loop at both individual and population levels. The CBB-loop model advances our understanding of the dynamic relationships between culture, behavior,
APA, Harvard, Vancouver, ISO, and other styles
10

Cukierman, Alex. Central Banks. Oxford University Press, 2018. http://dx.doi.org/10.1093/acrefore/9780190228637.013.64.

Full text
Abstract:
The first CBs were private institutions that were given a monopoly over the issuance of currency by government in return for help in financing the budget and adherence to the rules of the gold standard. Under this standard the price of gold in terms of currency was fixed and the CB could issue or retire domestic currency only in line with gold inflows or outflows. Due to the scarcity of gold this system assured price stability as long as it functioned. Wars and depressions led to the replacement of the gold standard by the more flexible gold exchange standard. Along with restrictions on intern
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "CBC mode"

1

Mitchell, Chris J. "Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?" In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11556992_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kurokawa, Takashi, Ryo Nojima, and Shiho Moriai. "Can We Securely Use CBC Mode in TLS1.0?" In Information and Communication Technology. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24315-3_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Paterson, Kenneth G., and Arnold Yau. "Padding Oracle Attacks on the ISO CBC Mode Encryption Standard." In Topics in Cryptology – CT-RSA 2004. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24660-2_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lin, Xiuqing, Wenqian Jiang, Jinjin Li, Jueyu Chen, and Keying Huang. "Research on the Rapid Realization of SM4 in CBC Mode." In Lecture Notes in Electrical Engineering. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-6934-6_66.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Paterson, Kenneth G., and Gaven J. Watson. "Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-85855-3_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yau, Arnold K. L., Kenneth G. Paterson, and Chris J. Mitchell. "Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs." In Fast Software Encryption. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11502760_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gmira, Faiq, and Said Hraoui. "A Color Image Encryption Method Designed Using Chaotic Confusion, Enhanced CBC-MAC Mode and Pixel Shuffling." In Digital Technologies and Applications. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-29857-8_53.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Faggian, Claudia, and Giulio Guerrieri. "Factorization in Call-by-Name and Call-by-Value Calculi via Linear Logic." In Lecture Notes in Computer Science. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71995-1_11.

Full text
Abstract:
AbstractIn each variant of the $$\lambda $$ λ -calculus, factorization and normalization are two key properties that show how results are computed. Instead of proving factorization/normalization for the call-by-name (CbN) and call-by-value (CbV) variants separately, we prove them only once, for the bang calculus (an extension of the $$\lambda $$ λ -calculus inspired by linear logic and subsuming CbN and CbV), and then we transfer the result via translations, obtaining factorization/normalization for CbN and CbV.The approach is robust: it still holds when extending the calculi with operators an
APA, Harvard, Vancouver, ISO, and other styles
9

Schnieder, Lars. "Operating Modes and Operating Mode Transitions in Automated Operations." In Communications-Based Train Control (CBTC). Springer Berlin Heidelberg, 2025. https://doi.org/10.1007/978-3-662-70251-2_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kroening, Daniel, and Michael Tautschnig. "CBMC – C Bounded Model Checker." In Tools and Algorithms for the Construction and Analysis of Systems. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54862-8_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "CBC mode"

1

Dong, Yang, Qingsong Meng, and Yanxin Zhang. "Research on UAV Aerial Image Detection Model Based on CBC-YOLOv10." In 2025 7th International Conference on Information Science, Electrical and Automation Engineering (ISEAE). IEEE, 2025. https://doi.org/10.1109/iseae64934.2025.11041986.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Waterink, E., R. José Santo, C. A. T. Van Den Berg, H. W. A. M. De Jong, A. Sbrizzi, and C. Beijst. "CBCT-MOTUS: Model-Based Non-Rigid Motion Estimation and Correction for CBCT Imaging." In 2024 IEEE Nuclear Science Symposium (NSS), Medical Imaging Conference (MIC) and Room Temperature Semiconductor Detector Conference (RTSD). IEEE, 2024. http://dx.doi.org/10.1109/nss/mic/rtsd57108.2024.10658257.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Chenqi, Yuan Li, and Yi Zhang. "Adaptive sliding mode preview control for SIRS model with saturation incidence." In 2024 43rd Chinese Control Conference (CCC). IEEE, 2024. http://dx.doi.org/10.23919/ccc63176.2024.10662188.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Xiaoqian, Richard L. J. Qiu, Tonghe Wang, et al. "Generating synthetic CT from CBCT using a patient-specific diffusion model for CBCT-guided adaptive radiotherapy." In Image-Guided Procedures, Robotic Interventions, and Modeling, edited by Maryam E. Rettmann and Jeffrey H. Siewerdsen. SPIE, 2025. https://doi.org/10.1117/12.3047698.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Abidi, Abdessalem, Qianxue Wang, Belgacem Bouallegue, Mohsen Machhout, and Christophe Guyeux. "Quantitative evaluation of chaotic CBC mode of operation." In 2016 2nd International Conference on Advanced Technologies for Signal and Image Processing (ATSIP). IEEE, 2016. http://dx.doi.org/10.1109/atsip.2016.7523053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

He, Yongcheng, and Shuguo Li. "A 3DES implementation especially for CBC feedback loop mode." In 2017 IEEE International Symposium on Circuits and Systems (ISCAS). IEEE, 2017. http://dx.doi.org/10.1109/iscas.2017.8050565.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Teşeleanu, George. "A Note on a CBC-Type Mode of Operation." In 20th International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2023. http://dx.doi.org/10.5220/0012059100003555.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Abidi, Abdessalem, Samar Tawbi, Christophe Guyeux, Belgacem Bouallegue, and Mohsen Machhout. "Summary of Topological Study of Chaotic CBC Mode of Operation." In 2016 19th IEEE Intl Conference on Computational Science and Engineering (CSE), IEEE 14th Intl Conference on Embedded and Ubiquitous Computing (EUC), and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES). IEEE, 2016. http://dx.doi.org/10.1109/cse-euc-dcabes.2016.220.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Naiem, Ghada Farouk, Salwa Elramly, Bahaa Eldeen Hasan, and Kaled Shehata. "An efficient implementation of CBC mode Rijndeal AES on an FPGA." In 2008 National Radio Science conference (NRSC). IEEE, 2008. http://dx.doi.org/10.1109/nrsc.2008.4542373.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vaidehi, M., and B. Justus Rabi. "Design and analysis of AES-CBC mode for high security applications." In 2014 2nd International Conference on Current Trends in Engineering and Technology (ICCTET). IEEE, 2014. http://dx.doi.org/10.1109/icctet.2014.6966347.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "CBC mode"

1

Pereira, R., and R. Adams. The ESP CBC-Mode Cipher Algorithms. RFC Editor, 1998. http://dx.doi.org/10.17487/rfc2451.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kato, A., M. Kanda, and S. Kanno. Camellia Counter Mode and Camellia Counter with CBC-MAC Mode Algorithms. RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5528.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Korotun, Olha V., Tetiana A. Vakaliuk, and Vladimir N. Soloviev. Model of using cloud-based environment in training databases of future IT specialists. [б. в.], 2020. http://dx.doi.org/10.31812/123456789/3865.

Full text
Abstract:
The authors substantiates and develops the model of using cloud-based environment (CBE) in the training of databases of future information technology (IT) specialists, which consists of interrelated units: target (purpose, task of using CBE), conceptual (pedagogical approaches, didactic principles), organizational and semantic (characteristics of CBE, basic requirements for CBE, subjects of training, CBE of the teacher, CBE of the student, curricula of institution of higher education, educational-methodical complex of discipline “Databases”, installation and configuration of database managemen
APA, Harvard, Vancouver, ISO, and other styles
4

Dixon, John A. An Expanded Cost-Benefit Analysis (CBA) of the Reventazón Hydroelectric Project (PHR), in Costa Rica. Inter-American Development Bank, 2013. http://dx.doi.org/10.18235/0009129.

Full text
Abstract:
As part of project preparation, a standard Cost-Benefit Analysis (CBA) was carried out for the Reventazón Hydroelectric Project (PHR). This paper builds on that CBA and will prepare an enhanced analysis that explicitly incorporates environmental and social aspects by applying the approach presented in the IDB Technical Note No. IDB-TN-428 (John A. Dixon, "Economic Cost-Benefit Analysis (CBA) of Project Environmental Impacts and Mitigation Measures," IDB, 2012). This implementation guideline suggests comparing the traditional CBA of a project (referred to as CBA Result 1) with a more comprehens
APA, Harvard, Vancouver, ISO, and other styles
5

Hoerger, Thomas, Joel Segel, Ping Zhang, and Stephen Sorensen. Validation of the CDC-RTI Diabetes Cost-Effectiveness Model. RTI Press, 2009. http://dx.doi.org/10.3768/rtipress.2009.mr.0013.0909.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Abad, Jorge, Galo Nuño, and Carlos Thomas. CBDC and the operational framework of monetary policy. Banco de España, 2024. http://dx.doi.org/10.53479/35997.

Full text
Abstract:
We analyse the impact of introducing a central bank-issued digital currency (CBDC) on the operational framework of monetary policy and the macroeconomy as a whole. To this end, we develop a New Keynesian model with heterogeneous banks, a frictional interbank market, a central bank with deposit and lending facilities, and household preferences for different liquid assets. The model is calibrated to replicate the main monetary and financial aggregates in the euro area. Our analysis predicts that CBDC adoption implies a roughly equivalent reduction in banks’ deposit funding. However, this ‘deposi
APA, Harvard, Vancouver, ISO, and other styles
7

Fairweather, Zan, Denzil Fiebig, Adam Gorajek, Rochelle Guttmann, June Ma, and Jack Mulqueeney. Valuing Safety and Privacy in Retail Central Bank Digital Currency. Reserve Bank of Australia, 2024. http://dx.doi.org/10.47688/rdp2024-02.

Full text
Abstract:
This paper explores the merits of introducing a retail central bank digital currency (CBDC) in Australia, focusing on the extent to which consumers would value having access to a digital form of money that is even safer and potentially more private than commercial bank deposits. To conduct our exploration we run a discrete choice experiment, which is a technique designed specifically for assessing public valuations of goods without markets. The results suggest that the average consumer attaches no value to the added safety of a CBDC. This is consistent with bank deposits in Australia already b
APA, Harvard, Vancouver, ISO, and other styles
8

Nelson, Gena, and Allyson J. Kiss. Curriculum-Based Measures in Mathematics. Boise State University, Albertsons Library, 2022. http://dx.doi.org/10.18122/sped.144.boisestate.

Full text
Abstract:
The purpose of this document is to provide readers with the coding protocol that authors used to code 96 studies that focused on Stages 1, 2, and/or 3 of curriculum-based measurement in mathematics (CBM-M) research. Stage 1 refers to evidence for using CBM at one point in time (i.e., static scores), such as for screening for difficulty. Stage 2 refers to evidence for using CBM repeatedly overtime, such as for progress monitoring. Stage 3 focuses on the instructional utility of CBM (i.e., instructional decisions to increase student achievement). The purpose of the systematic review was to updat
APA, Harvard, Vancouver, ISO, and other styles
9

Sharif, Mariam, Rasha Ahmed, Diane Duclos, and Jennifer Palmer. Strengthening Health Information Surveillance: Implementing Community-Based Surveillance in Sudan. Institute of Development Studies, 2023. http://dx.doi.org/10.19088/sshap.2023.011.

Full text
Abstract:
This case study explores the 2018–22 implementation of a national community-based surveillance (CBS) programme in Sudan. The programme was designed to meet critical needs of the existing health surveillance system. It aimed to empower communities to detect and contain public health threats, improve relations between communities and their local health system, and involve villages in rural areas. Federal, state, and locality (district) staff attended CBS workshops before recruiting and training community volunteers. Over 8,000 volunteers across 11 states were recruited. The volunteers alerted st
APA, Harvard, Vancouver, ISO, and other styles
10

Smith III, F. G. A Module for Graphical Display of Model Results with the CBP Toolbox. Office of Scientific and Technical Information (OSTI), 2015. http://dx.doi.org/10.2172/1178649.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!