Academic literature on the topic 'CBC mode'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'CBC mode.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "CBC mode"
Chang, Kai-Chun, You-Tun Teng, and Wen-Long Chin. "High-Throughput CBC Mode Crypto Circuit." Electrical Science & Engineering 5, no. 1 (2023): 20–30. http://dx.doi.org/10.30564/ese.v5i1.5636.
Full textTan, Cheng, Xiaoyan Deng, and Lijun Zhang. "Identification of Block Ciphers under CBC Mode." Procedia Computer Science 131 (2018): 65–71. http://dx.doi.org/10.1016/j.procs.2018.04.186.
Full textAlslman, Yasmeen Shaher, Ashraf Ahmad, and Yousef AbuHour. "Enhanced and authenticated cipher block chaining mode." Bulletin of Electrical Engineering and Informatics 12, no. 4 (2023): 2357–62. http://dx.doi.org/10.11591/beei.v12i4.5113.
Full textAlslman, Yasmeen Shaher, Ashraf Ahmad, and Yousef AbuHour. "Enhanced and authenticated cipher block chaining mode." Bulletin of Electrical Engineering and Informatics 12, no. 4 (2023): 2357–62. http://dx.doi.org/10.11591/eei.v12i4.5113.
Full textAbidi, Abdessalem, Qianxue Wang, Belgacem Bouallegue, Mohsen Machhout, and Christophe Guyeux. "Proving Chaotic Behavior of CBC Mode of Operation." International Journal of Bifurcation and Chaos 26, no. 07 (2016): 1650113. http://dx.doi.org/10.1142/s0218127416501133.
Full textRizky, Putri Alifia, Sopian Soim, and Sholihin Sholihin. "Implementasi Algoritma Kriptografi AES CBC Untuk Keamanan Komunikasi Data Pada Hardware." Jurnal RESISTOR (Rekayasa Sistem Komputer) 7, no. 2 (2024): 71–78. https://doi.org/10.31598/jurnalresistor.v7i2.1650.
Full textAntariksa, Feillyan Alfreda. "Ransomware Attack using AES Encryption on ECB, CBC and CFB Mode." Jurnal Ilmu Komputer 12, no. 1 (2019): 8. http://dx.doi.org/10.24843/jik.2019.v12.i01.p06.
Full textHwang, Seongjin, and Changhoon Lee. "Padding Oracle Attack on Block Cipher with CBC|CBC-Double Mode of Operation using the BOZ-PAD." Journal of Society for e-Business Studies 20, no. 1 (2015): 89–97. http://dx.doi.org/10.7838/jsebs.2015.20.1.089.
Full textAliyah, Jannatun. "APLIKASI MOBILE UNTUK ENKRIPSI DATA GAMBAR MENGGUNAKAN KOMBINASI FUNGSI XOR DAN MODE OPERASI CBC." Jurnal Informatika, Teknologi dan Sains 2, no. 4 (2020): 214–22. http://dx.doi.org/10.51401/jinteks.v2i4.824.
Full textLi, Jiajian, Shuai Cao, and Erol Yilmaz. "Characterization of Macro Mechanical Properties and Microstructures of Cement-Based Composites Prepared from Fly Ash, Gypsum and Steel Slag." Minerals 12, no. 1 (2021): 6. http://dx.doi.org/10.3390/min12010006.
Full textDissertations / Theses on the topic "CBC mode"
Yau, Arnold K. L. "Side channel analyses of CBC mode encryption." Thesis, University of London, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.537515.
Full textWatson, Gaven James. "Provable security in practice : Analysis of SSH and CBC mode with padding." Thesis, Royal Holloway, University of London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.530797.
Full textNatter, Martin, and Markus Feurstein. "Correcting for CBC model bias. A hybrid scanner data - conjoint model." SFB Adaptive Information Systems and Modelling in Economics and Management Science, WU Vienna University of Economics and Business, 2001. http://epub.wu.ac.at/880/1/document.pdf.
Full textKelur, Ashok. "Model checking of multicore software using CBMC." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-182169.
Full textLoock, Marianne. "CBAC – a model for conflict-based access control." Thesis, University of Pretoria, 2012. http://hdl.handle.net/2263/25423.
Full textClaeson, Holmgren Mathilda, and Tilda Göransson. "Cirkulär ekonomi på mikronivå : En fallstudie om hur ett mikroföretag imodebranchen kan agera för att sluta kretsloppet." Thesis, Högskolan i Borås, Akademin för textil, teknik och ekonomi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-14768.
Full textde, Siqueira Teles Fabrício. "Towards Model-Driven Engineering Constraint-Based Scheduling Applications." Universidade Federal de Pernambuco, 2008. https://repositorio.ufpe.br/handle/123456789/2348.
Full textKördel, Mikael. "A Physical X-Ray Scintillator Detector Model for CBCT Imaging Applications." Thesis, KTH, Medicinsk bildfysik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-147690.
Full textau, cplottke@fizzy murdoch edu, and Christopher Martin Plottke. "S-wave model in electron-atom collisions." Murdoch University, 2004. http://wwwlib.murdoch.edu.au/adt/browse/view/adt-MU20040818.111937.
Full textMarques, Daniel Ruivo. "The hyperarousal hypothesis in psychophysiological insomnia: study of default-mode network and its modification after CBT." Doctoral thesis, Universidade de Aveiro, 2016. http://hdl.handle.net/10773/16787.
Full textBooks on the topic "CBC mode"
Ravagnan, Luigi, and Giordano Balestrazzi. Falso in bilancio: Reato di moda : riflessioni sull'articolo 2621 c.c. Corbo, 1998.
Find full textLi, Yiding. Canonical analysis of oil data and pH model building for CBM. National Library of Canada, 2003.
Find full textYan, Gao. Application of DPCA to oil data pH model building and comparison of optimal CBM policies. National Library of Canada, 2003.
Find full textRostikawati, Rin. Model pemberdayaan perempuan korban kekerasan melalui pendekatan community based crisis center (CBCC): Laporan hibah kompetitif penelitian sesuai prioritas nasional. Universitas Jenderal Soedirman, Fakultas Ilmu Sosial dan Ilmu Politik, Jurusan Sosiologi, 2010.
Find full textPettis, D. L. Birmingham: a study in the effects of the CBD-focussed model of regeneration on the residents in the inner core of the city. Oxford Brookes University, 1994.
Find full textCentro de Arte Contemporáneo de Málaga and Málaga (Spain) Ayuntamiento, eds. William Kentridge: ¿no se unirá usted al baile? : CAC Málaga, Centro de Arte Contemporáneo de Málaga, 14 febrero-13 mayo 2012, 14 February-13 May 2012. CAC Málaga, Centro de Arte Contemporáneo de Málaga, 2011.
Find full textMartin, Keith M. Data Integrity. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0006.
Full textLesorogol, Carolyn K. Conservation and Community in Kenya. The Rowman & Littlefield Publishing Group, 2022. https://doi.org/10.5040/9781666986761.
Full textHan, Shihui. A culture–behavior–brain-loop model of human development. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780198743194.003.0008.
Full textCukierman, Alex. Central Banks. Oxford University Press, 2018. http://dx.doi.org/10.1093/acrefore/9780190228637.013.64.
Full textBook chapters on the topic "CBC mode"
Mitchell, Chris J. "Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?" In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11556992_18.
Full textKurokawa, Takashi, Ryo Nojima, and Shiho Moriai. "Can We Securely Use CBC Mode in TLS1.0?" In Information and Communication Technology. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24315-3_15.
Full textPaterson, Kenneth G., and Arnold Yau. "Padding Oracle Attacks on the ISO CBC Mode Encryption Standard." In Topics in Cryptology – CT-RSA 2004. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24660-2_24.
Full textLin, Xiuqing, Wenqian Jiang, Jinjin Li, Jueyu Chen, and Keying Huang. "Research on the Rapid Realization of SM4 in CBC Mode." In Lecture Notes in Electrical Engineering. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-6934-6_66.
Full textPaterson, Kenneth G., and Gaven J. Watson. "Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-85855-3_23.
Full textYau, Arnold K. L., Kenneth G. Paterson, and Chris J. Mitchell. "Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs." In Fast Software Encryption. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11502760_20.
Full textGmira, Faiq, and Said Hraoui. "A Color Image Encryption Method Designed Using Chaotic Confusion, Enhanced CBC-MAC Mode and Pixel Shuffling." In Digital Technologies and Applications. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-29857-8_53.
Full textFaggian, Claudia, and Giulio Guerrieri. "Factorization in Call-by-Name and Call-by-Value Calculi via Linear Logic." In Lecture Notes in Computer Science. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71995-1_11.
Full textSchnieder, Lars. "Operating Modes and Operating Mode Transitions in Automated Operations." In Communications-Based Train Control (CBTC). Springer Berlin Heidelberg, 2025. https://doi.org/10.1007/978-3-662-70251-2_4.
Full textKroening, Daniel, and Michael Tautschnig. "CBMC – C Bounded Model Checker." In Tools and Algorithms for the Construction and Analysis of Systems. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54862-8_26.
Full textConference papers on the topic "CBC mode"
Dong, Yang, Qingsong Meng, and Yanxin Zhang. "Research on UAV Aerial Image Detection Model Based on CBC-YOLOv10." In 2025 7th International Conference on Information Science, Electrical and Automation Engineering (ISEAE). IEEE, 2025. https://doi.org/10.1109/iseae64934.2025.11041986.
Full textWaterink, E., R. José Santo, C. A. T. Van Den Berg, H. W. A. M. De Jong, A. Sbrizzi, and C. Beijst. "CBCT-MOTUS: Model-Based Non-Rigid Motion Estimation and Correction for CBCT Imaging." In 2024 IEEE Nuclear Science Symposium (NSS), Medical Imaging Conference (MIC) and Room Temperature Semiconductor Detector Conference (RTSD). IEEE, 2024. http://dx.doi.org/10.1109/nss/mic/rtsd57108.2024.10658257.
Full textWang, Chenqi, Yuan Li, and Yi Zhang. "Adaptive sliding mode preview control for SIRS model with saturation incidence." In 2024 43rd Chinese Control Conference (CCC). IEEE, 2024. http://dx.doi.org/10.23919/ccc63176.2024.10662188.
Full textChen, Xiaoqian, Richard L. J. Qiu, Tonghe Wang, et al. "Generating synthetic CT from CBCT using a patient-specific diffusion model for CBCT-guided adaptive radiotherapy." In Image-Guided Procedures, Robotic Interventions, and Modeling, edited by Maryam E. Rettmann and Jeffrey H. Siewerdsen. SPIE, 2025. https://doi.org/10.1117/12.3047698.
Full textAbidi, Abdessalem, Qianxue Wang, Belgacem Bouallegue, Mohsen Machhout, and Christophe Guyeux. "Quantitative evaluation of chaotic CBC mode of operation." In 2016 2nd International Conference on Advanced Technologies for Signal and Image Processing (ATSIP). IEEE, 2016. http://dx.doi.org/10.1109/atsip.2016.7523053.
Full textHe, Yongcheng, and Shuguo Li. "A 3DES implementation especially for CBC feedback loop mode." In 2017 IEEE International Symposium on Circuits and Systems (ISCAS). IEEE, 2017. http://dx.doi.org/10.1109/iscas.2017.8050565.
Full textTeşeleanu, George. "A Note on a CBC-Type Mode of Operation." In 20th International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2023. http://dx.doi.org/10.5220/0012059100003555.
Full textAbidi, Abdessalem, Samar Tawbi, Christophe Guyeux, Belgacem Bouallegue, and Mohsen Machhout. "Summary of Topological Study of Chaotic CBC Mode of Operation." In 2016 19th IEEE Intl Conference on Computational Science and Engineering (CSE), IEEE 14th Intl Conference on Embedded and Ubiquitous Computing (EUC), and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES). IEEE, 2016. http://dx.doi.org/10.1109/cse-euc-dcabes.2016.220.
Full textNaiem, Ghada Farouk, Salwa Elramly, Bahaa Eldeen Hasan, and Kaled Shehata. "An efficient implementation of CBC mode Rijndeal AES on an FPGA." In 2008 National Radio Science conference (NRSC). IEEE, 2008. http://dx.doi.org/10.1109/nrsc.2008.4542373.
Full textVaidehi, M., and B. Justus Rabi. "Design and analysis of AES-CBC mode for high security applications." In 2014 2nd International Conference on Current Trends in Engineering and Technology (ICCTET). IEEE, 2014. http://dx.doi.org/10.1109/icctet.2014.6966347.
Full textReports on the topic "CBC mode"
Pereira, R., and R. Adams. The ESP CBC-Mode Cipher Algorithms. RFC Editor, 1998. http://dx.doi.org/10.17487/rfc2451.
Full textKato, A., M. Kanda, and S. Kanno. Camellia Counter Mode and Camellia Counter with CBC-MAC Mode Algorithms. RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5528.
Full textKorotun, Olha V., Tetiana A. Vakaliuk, and Vladimir N. Soloviev. Model of using cloud-based environment in training databases of future IT specialists. [б. в.], 2020. http://dx.doi.org/10.31812/123456789/3865.
Full textDixon, John A. An Expanded Cost-Benefit Analysis (CBA) of the Reventazón Hydroelectric Project (PHR), in Costa Rica. Inter-American Development Bank, 2013. http://dx.doi.org/10.18235/0009129.
Full textHoerger, Thomas, Joel Segel, Ping Zhang, and Stephen Sorensen. Validation of the CDC-RTI Diabetes Cost-Effectiveness Model. RTI Press, 2009. http://dx.doi.org/10.3768/rtipress.2009.mr.0013.0909.
Full textAbad, Jorge, Galo Nuño, and Carlos Thomas. CBDC and the operational framework of monetary policy. Banco de España, 2024. http://dx.doi.org/10.53479/35997.
Full textFairweather, Zan, Denzil Fiebig, Adam Gorajek, Rochelle Guttmann, June Ma, and Jack Mulqueeney. Valuing Safety and Privacy in Retail Central Bank Digital Currency. Reserve Bank of Australia, 2024. http://dx.doi.org/10.47688/rdp2024-02.
Full textNelson, Gena, and Allyson J. Kiss. Curriculum-Based Measures in Mathematics. Boise State University, Albertsons Library, 2022. http://dx.doi.org/10.18122/sped.144.boisestate.
Full textSharif, Mariam, Rasha Ahmed, Diane Duclos, and Jennifer Palmer. Strengthening Health Information Surveillance: Implementing Community-Based Surveillance in Sudan. Institute of Development Studies, 2023. http://dx.doi.org/10.19088/sshap.2023.011.
Full textSmith III, F. G. A Module for Graphical Display of Model Results with the CBP Toolbox. Office of Scientific and Technical Information (OSTI), 2015. http://dx.doi.org/10.2172/1178649.
Full text