Showing 121 - 140 results of 247 for search '"cipher"', query time: 0.07s Refine Results
  1. 121
  2. 122

    Construction of MDS matrices by Peng-fei LI, Yong-qiang LI

    Published 2016-06-01
    Subjects: “…block cipher…”
    Get full text
    Article
  3. 123
  4. 124
  5. 125
  6. 126
  7. 127
  8. 128
  9. 129
  10. 130
  11. 131
  12. 132
  13. 133
  14. 134

    DNA Origami Model for Simple Image Decoding by Risheng Wang, Zhixiang Yin, Jianzhong Cui, Jing Yang, Zhen Tang, Xinmu Yang, Xianya Geng

    Published 2020-01-01
    “…When the cipher is correct, the cipher chain can open the molecular beacon and the hairpin structure to display the cipher pattern on the origami base in the solution.…”
    Get full text
    Article
  15. 135

    A Novel Approach for Safeguarding Kurdish Text Files via Modified AES-OTP and Enhanced RSA Cryptosystem on Unreliable Networks by Newroz Nooralddin Abdulrazaq

    Published 2024-06-01
    “…This paper provides a new method for encrypting and decrypting classified text files in the Kurdish alphabet using the modified Advanced Encryption Standard (AES) cipher system with the adoption of Cipher Block Chaining (CBC) mode based on a one-time pad (OTP) cipher. …”
    Get full text
    Article
  16. 136

    FPE scheme based on k-splits Feistel network by Jing-wei LI, Chun-fu JIA, Zhe-li LIU, Min LI

    Published 2012-04-01
    “…The construction features and discipline of Feistel network-based FPE(format-preserving encryption)schemes were analyzed.Considering on the problem that 2-splits Feistel networks-based FPE cipher’s block size was in narrow range,a type-2 Feistel network-based FPE scheme,which was suitable for constructing FPE cipher with scalable block size,was presented.Experiment show that type-2 Feistel network is able to use small-scaled pseudorandom function to construct cipher with scalable block size and that is practical.…”
    Get full text
    Article
  17. 137

    New Practical Attacks on GEA-1 Based on a New-Found Weakness by Zheng Wu, Lin Ding, Zhengting Li, Xinhai Wang, Ziyu Guan

    Published 2024-01-01
    “…Now, a variety of current mobile phones still support this standard cipher. In this paper, a structural weakness of the GEA-1 stream cipher that has not been found in previous works is discovered and analyzed. …”
    Get full text
    Article
  18. 138

    Block level cloud data deduplication scheme based on attribute encryption by Wenting GE, Weihai LI, Nenghai YU

    Published 2023-10-01
    “…Due to the existing cloud data deduplication schemes mainly focus on file-level deduplication.A scheme was proposed, based on attribute encryption, to support data block-level weight removal.Double granularity weight removal was performed for both file-level and data block-level, and data sharing was achieved through attribute encryption.The algorithm was designed on the hybrid cloud architecture Repeatability detection and consistency detection were conducted by the private cloud based on file labels and data block labels.A Merkle tree was established based on block-level labels to support user ownership proof.When a user uploaded the cipher text, the private cloud utilized linear secret sharing technology to add access structures and auxiliary information to the cipher text.It also updated the overall cipher text information for new users with permissions.The private cloud served as a proxy for re-encryption and proxy decryption, undertaking most of the calculation when the plaintext cannot be obtained, thereby reducing the computing overhead for users.The processed cipher text and labels were stored in the public cloud and accessed by the private cloud.Security analysis shows that the proposed scheme can achieve PRV-CDA (Privacy Choose-distribution attacks) security in the private cloud.In the simulation experiment, four types of elliptic curve encryption were used to test the calculation time for key generation, encryption, and decryption respectively, for different attribute numbers with a fixed block size, and different block sizes with a fixed attribute number.The results align with the characteristics of linear secret sharing.Simulation experiments and cost analysis demonstrate that the proposed scheme can enhance the efficiency of weight removal and save time costs.…”
    Get full text
    Article
  19. 139

    Attribute-based encryption schema with group signatures by Xinglan ZHANG, Yao CUI

    Published 2019-02-01
    “…Cipher text-policy attribute-based encryption schema(CP-ABE) is widely used in protection of sensitive data.In CP-ABE,When the users access the cipher text,the access structure and the cipher text were sent to the users.However,the access structure is also has private information which can lead to leak of the privacy.The group signatures were used in CP-ABE to realize protection of the privacy.What’s more,it can satisfy indistinguishable under the choice of plaintext attack.…”
    Get full text
    Article
  20. 140

    Chaotic Image Encryption Scheme Based on Improved Z-Order Curve, Modified Josephus Problem, and RNA Operations: An Experimental Li-Fi Approach by S. B. Nono Fotso, J. H. Talla Mbé, W. N. Atchoffo, A. C. Nzeukou, A. R. Ndjiongue

    Published 2024-01-01
    “…Subsequently, a Vigenère cipher–based RNA operation serves for diffusion alongside basic RNA operations and the cipher block chaining (CBC) mode. …”
    Get full text
    Article