- 
            121
High-performance and high-concurrency encryption scheme for Hadoop platform
Published 2019-12-01Subjects: Get full text
Article - 
            122
 - 
            123
k-error linear complexity of q-ary sequence of period p<sup>2</sup>
Published 2019-12-01Subjects: “…stream cipher…”
Get full text
Article - 
            124
Round reduction-based fault attack on SM4 algorithm
Published 2016-10-01Subjects: Get full text
Article - 
            125
A New Practical Cube Attack via Recovering Numerous Superpolys
Published 2024-12-01Subjects: Get full text
Article - 
            126
 - 
            127
Improving Error Correction Stage and Expanding the Final Key using Dynamic Linear-feedback Shift Register in Sarg04 Protocol
Published 2019-04-01Subjects: Get full text
Article - 
            128
DNA-PRESENT: An Improved Security and Low-Latency, Lightweight Cryptographic Solution for IoT
Published 2024-12-01Subjects: Get full text
Article - 
            129
«The black room» the Russian foreign Ministry against Napoleon
Published 2012-10-01Subjects: Get full text
Article - 
            130
One-way hash function construction based on Chen-type hyper-chaotic system and key-stream
Published 2009-01-01Subjects: Get full text
Article - 
            131
The 2-adic complexity and the 1-error 2-adic complexity of single cycle T-functions
Published 2014-03-01Subjects: “…stream cipher…”
Get full text
Article - 
            132
Research on Space-Ground Network Security Guarantee Technology
Published 2020-09-01Subjects: Get full text
Article - 
            133
Impossible differential cryptanalysis of reduced-round <inline-formula><alternatives><math xmlns:mml="http://www.w3.org/1998/Math/MathML" id="M2"><msup><mrow><mi mathvariant="bold-...
Published 2024-11-01Subjects: “…lightweight block cipher…”
Get full text
Article - 
            134
DNA Origami Model for Simple Image Decoding
Published 2020-01-01“…When the cipher is correct, the cipher chain can open the molecular beacon and the hairpin structure to display the cipher pattern on the origami base in the solution.…”
Get full text
Article - 
            135
A Novel Approach for Safeguarding Kurdish Text Files via Modified AES-OTP and Enhanced RSA Cryptosystem on Unreliable Networks
Published 2024-06-01“…This paper provides a new method for encrypting and decrypting classified text files in the Kurdish alphabet using the modified Advanced Encryption Standard (AES) cipher system with the adoption of Cipher Block Chaining (CBC) mode based on a one-time pad (OTP) cipher. …”
Get full text
Article - 
            136
FPE scheme based on k-splits Feistel network
Published 2012-04-01“…The construction features and discipline of Feistel network-based FPE(format-preserving encryption)schemes were analyzed.Considering on the problem that 2-splits Feistel networks-based FPE cipher’s block size was in narrow range,a type-2 Feistel network-based FPE scheme,which was suitable for constructing FPE cipher with scalable block size,was presented.Experiment show that type-2 Feistel network is able to use small-scaled pseudorandom function to construct cipher with scalable block size and that is practical.…”
Get full text
Article - 
            137
New Practical Attacks on GEA-1 Based on a New-Found Weakness
Published 2024-01-01“…Now, a variety of current mobile phones still support this standard cipher. In this paper, a structural weakness of the GEA-1 stream cipher that has not been found in previous works is discovered and analyzed. …”
Get full text
Article - 
            138
Block level cloud data deduplication scheme based on attribute encryption
Published 2023-10-01“…Due to the existing cloud data deduplication schemes mainly focus on file-level deduplication.A scheme was proposed, based on attribute encryption, to support data block-level weight removal.Double granularity weight removal was performed for both file-level and data block-level, and data sharing was achieved through attribute encryption.The algorithm was designed on the hybrid cloud architecture Repeatability detection and consistency detection were conducted by the private cloud based on file labels and data block labels.A Merkle tree was established based on block-level labels to support user ownership proof.When a user uploaded the cipher text, the private cloud utilized linear secret sharing technology to add access structures and auxiliary information to the cipher text.It also updated the overall cipher text information for new users with permissions.The private cloud served as a proxy for re-encryption and proxy decryption, undertaking most of the calculation when the plaintext cannot be obtained, thereby reducing the computing overhead for users.The processed cipher text and labels were stored in the public cloud and accessed by the private cloud.Security analysis shows that the proposed scheme can achieve PRV-CDA (Privacy Choose-distribution attacks) security in the private cloud.In the simulation experiment, four types of elliptic curve encryption were used to test the calculation time for key generation, encryption, and decryption respectively, for different attribute numbers with a fixed block size, and different block sizes with a fixed attribute number.The results align with the characteristics of linear secret sharing.Simulation experiments and cost analysis demonstrate that the proposed scheme can enhance the efficiency of weight removal and save time costs.…”
Get full text
Article - 
            139
Attribute-based encryption schema with group signatures
Published 2019-02-01“…Cipher text-policy attribute-based encryption schema(CP-ABE) is widely used in protection of sensitive data.In CP-ABE,When the users access the cipher text,the access structure and the cipher text were sent to the users.However,the access structure is also has private information which can lead to leak of the privacy.The group signatures were used in CP-ABE to realize protection of the privacy.What’s more,it can satisfy indistinguishable under the choice of plaintext attack.…”
Get full text
Article - 
            140
Chaotic Image Encryption Scheme Based on Improved Z-Order Curve, Modified Josephus Problem, and RNA Operations: An Experimental Li-Fi Approach
Published 2024-01-01“…Subsequently, a Vigenère cipher–based RNA operation serves for diffusion alongside basic RNA operations and the cipher block chaining (CBC) mode. …”
Get full text
Article