Showing 121 - 140 results of 2,106 for search '"cipher"', query time: 1.61s Refine Results
  1. 121
  2. 122
    by Eman Al-Obaidy
    Published 2009-07-01
    Subjects: ...knapsack cipher...
    Get full text
    Article
  3. 123
    by Ghusoon Basheer
    Published 2008-07-01
    ... to obtain a best secret key in polyalphabetic substitution cipher. This key will be used then for encryption...
    Get full text
    Article
  4. 124
  5. 125
    ... the cipher text block and the rate part of the next feedback (in traditional sponge these two values...
    Get full text
    Article
  6. 126
    by Jaewoo So
    Published 2020-01-01
    ... the model tries to find the key of block ciphers from known plaintext-ciphertext pairs. We show...
    Get full text
    Article
  7. 127
  8. 128
    by عامر عبد اللهيبي
    Published 2019-02-01
    ... In this paper, a method for hiding cipher text in an image file is introduced . The proposed...
    Get full text
    Article
  9. 129
    by Xiaojuan Zhang, Xiutao Feng, Dongdai Lin
    Published 2017-01-01
    ...Fault attack is an efficient cryptanalysis method against cipher implementations and has attracted...
    Get full text
    Article
  10. 130
    by Yan Yingjian, Zheng Zhen
    Published 2019-08-01
    Subjects: ...block cipher...
    Get full text
    Article
  11. 131
  12. 132
    ...In this paper, we show that stream ciphers with a particular form of ciphertext output function...
    Get full text
    Article
  13. 133
    Subjects: ...symmetric block cipher, the statistical security, correlation properties, avalanche effect...
    Get full text
    Article
  14. 134
    ...Recent lightweight block cipher competition (FELICS Triathlon) evaluates efficient implementations...
    Get full text
    Article
  15. 135
  16. 136
    ... cipher algorithm MORUS. We propose fault attacks on MORUS with two different goals: one to breach...
    Get full text
    Article
  17. 137
    Subjects: ...Back propagation, Ciphering, Encryption, FPGA, Neural Network, VHDL...
    Get full text
    Article
  18. 138
    by Siddeq Ameen, Mazin Othman, Safwan Hasson
    Published 1999-11-01
    ... the neural networks in block cipher algorithms. Taking into consideration different plaintexts block size...
    Get full text
    Article
  19. 139
    ... generated a valid MAC. The proposed security scheme incorporates an FIPS approved and secure block cipher...
    Get full text
    Article
  20. 140