Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Block cipher"

ADD TO MY LIST
 
The PYRAMIDS Block Cipher

Author(s): Hussein Ahmad Al Hassan | Magdy Saeb | Hassan Desoky Hamed
A Generalization of the RSA Elatrash Scheme

Author(s): Fayik Ramadan EL-Naowk
LCASE: Lightweight Cellular Automata-based Symmetric-key Encryption

Author(s): Somanath Tripathy | Sukumar Nandi
On Software Implementation of Fast DDP-based Ciphers

Author(s): Nikolay A. Moldovyan | Peter A. Moldovyanu | Douglas H. Summerville
A Block Cipher Involving Interlacing and Decomposition

Author(s): S. Udaya Kumar | V.U.K. Sastry | A. Vinaya babu
A New Involutory MDS Matrix for the AES

Author(s): Jorge Nakahara Jr | Élcio Abrahão
Image Encryption Using Chaos and Block Cipher

Author(s): Alireza Jolfaei | Abdolrasoul Mirghadri
A Blending of A Generalized Playfair Cipher and A Modified Hill Cipher

Author(s): V.U.K. Sastry | N. Ravi Shankar | S. Durga Bhavani
Frame Based Symmetric Key Cryptography

Author(s): Uttam Kr. Mondal | Satyendra Nath Mandal | J. PalChoudhury | J.K.Mandal
On Partial Linearization of Byte Substitution Transformation of Rijndael-The AES

Author(s): Y. Talwar | C. E.V. Madhavan | Navin Rajpal
A Secured Smart Card Using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES

Author(s): Ehab Mahmoud Mohamed | Yasien Mahmoud | Hiroshi Furukawa
A Novel Multiple Key Block Ciphering Mechanism with Reduced Computational Overhead

Author(s): V.S.Shankar Sriram | Abhishek Kumar Maurya | G.Sahoo
Parallel Key Encryption for CBC and Interleaved CBC

Author(s): S.Ashokkumar | K.Karuppasamy | Balaji Srinivasan | V.Balasubramanian
Comparative Analysis of S-boxes Based on Graphical SAC

Author(s): Iqtadar Hussain | Tariq Shah | Hasan Mahmood | Mehreen Afzal
Design of a High Throughput 128-bit AES (Rijndael Block Cipher)

Author(s): Tanzilur Rahman | Shengyi Pan | Qi Zhang
A Large Block Cipher Using Linear Congruences

Author(s): Dr. V.U.K Sastry | V.Janaki
A Note On Self-Shrinking Lagged Fibonacci Generator

Author(s): Moon K. Chetry | W. B. Vasantha Kandaswamy
Related-Mode Attacks on CTR Encryption Mode

Author(s): Dayin Wang | Dongdai Lin | Wenling Wu
Stream or Block Cipher for Securing VoIP?

Author(s): Ashraf D. Elbayoumy | Simon J. Shepherd
The New Block Cipher: BC2

Author(s): Yusuf Kurniawan | Adang Suwandi A. | M. Sukrisno Mardiyanto | Iping Supriana S. | Sarwono Sutikno
A Related Key Attack on the Feistel Type Block Ciphers

Author(s): Ali Bagherzandi | Mahmoud Salmasizadeh | Javad Mohajeri
Analysis of Venkaiah et al.'s AES Design

Author(s): Jorge Nakahara
A Modified Feistel Cipher Involving Modular Arithmetic and Interlacing

Author(s): V. U. K. Sastry, D. S. R. Murthy, S. Durga Bhavani
A Modified Hill Cipher Involving a Pair of Keys and a Permutation

Author(s): V.U.K.Sastry, Aruna Varanasi and S.Udaya Kumar
A Large Block Cipher Involving a Key Applied on Both the Sides of the Plain Text

Author(s): V. U. K. Sastry, D. S. R. Murthy, S. Durga Bhavani
A Generalized Playfair Chipher involving Intertwining, Interweaving and Iteration

Author(s): V.U.K. Sastry | N. Ravi Shankar | S. Durga Bhavani
Pipelining Architecture of AES Encryption and Key Generation with Search Based Memory

Author(s): Subashri T | Arunachalam R | Gokul Vinoth Kumar B | Vaidehi V
Novel Hardware Implementation of the Cipher Message Authentication Code

Author(s): H. E. Michail | G. Selimis | M. Galanis | D. Schinianakis | C. E. Goutis
A Block Cipher Using Linear Congruences

Author(s): V. U.K. Sastry | V. Janaki
Modified Hill Cipher with Interlacing and Iteration

Author(s): V. U.K.. Sastry | N. R. Shankar
A Novel Luby-Rackoff Based Cipher in a NewFeistel-Network Based LPRKES for Smart Cards

Author(s): Ehab Mahmoud Mohamed | Hiroshi Furukawa | Yasien Mahmoud
Comparative study between stream cipher and block cipher using RC4 and Hill Cipher

Author(s): Shish Ahmad | Mohd. Rizwan Beg | Qamar Abbas | Jameel Ahmad | Syed Mohd Atif
A Block Cipher Generation Using Color Substitution

Author(s): Ravindra Babu Kallam | S. Udaya Kumar | M. Thirupathi Reddy
Selective Image Encryption Using DCT with Stream Cipher

Author(s): Sapna Sasidharan | Jithin R
New Class of Cryptographic Primitives and Cipher Design for Networks Security

Author(s): Nikolay Moldovyan | A. A. Moldovyan | M. A. Eremeev | N. Sklavos
Key Transformation Approach for Rijndael Security

Author(s): Z. Muda | R. Mahmod | M.R. Sulong
EPS Confidentiality and Integrity mechanisms Algorithmic Approach

Author(s): Ghizlane Orhanou | Said Elhajji | Youssef Bentaleb | Jalal Laassiri
Spiking Neurons With ASNN Based-Methods for the Neural Block Cipher

Author(s): Saleh Ali K. Al-Omari | Putra Sumari
Cryptanalysis and Improvement of a Block Cipher Based on Multiple Chaotic Systems

Author(s): Jun He | Haifeng Qian | Yuan Zhou | Zhibin Li
A Performance Study on AES Algorithms

Author(s): B.D.C.N.Prasad | P.E.S.N.krishna Prasad | P Sita Rama Murty | K Madhavi
NUMERIC TO NUMERIC ENCRYPTION OF DATABASES: Comparison of Standard Encryption and the Proposed 3Kdec Algorithms

Author(s): Dr. Himanshu Aggarwal, Kamaljit Kaur, Kanwalvir Singh Dhindsa, Ghanaya Singh
A Block Cipher Involving a Key Applied on Both the Sides of the Plain Text

Author(s): V. U. K. Sastry, D. S. R. Murthy, S. Durga Bhavani
Implementation of Low Power Scalable Encryption Algorithm

Author(s): K.J. Jegadish Kumar | S. Salivahanan | K. Chenna Kesava Reddy
A Survey on Cryptography and Steganography Methods for Information Security

Author(s): Kallam Ravindra Babu | Dr. S.Udaya Kumar | Dr. A.Vinaya Babu
Secure Chaotic Map Based Block Cryptosystem with Application to Camera Sensor Networks

Author(s): Xianfeng Guo | Jiashu Zhang | Muhammad Khurram Khan | Khaled Alghathbar
New Directions in Cryptanalysis of Block Ciphers

Author(s): Davood RezaeiPour | Mohamad R.M. Said
Bitwise Operations Based Encryption and Decryption

Author(s): K.Naveen Kumar | K.T.Praveen kumar | G.V.S.Raj Kumar, | P.Chandra Sekhar
Substitution-diffusion based Image Cipher

Author(s): Narendra K Pareek | Vinod Patidar | Krishan K Sud
A Hyper Modern Cryptography Algorithm to Improved Data Security: HMCA

Author(s): Vishwa Gupta | Gajendra Singh | Ravindra Gupta
A Block Cipher Using Graph Structures and Logical XOR Operation

Author(s): CH. Suneetha | D. Sravan Kumar | A.Chandra sekhar
A proposed Modified Data Encryption Standard algorithm by Using Fusing Data Techniqu

Author(s): Alaa H. AL-Hamami | Mohammad A. AL-Hamami | Soukaena H. Hashem
Key Based Random Permutation (KBRP)

Author(s): Shakir M. Hussain | Naim M. Ajlouni
A CONFIGURABLE SECURED IMAGE ENCRYPTION TECHNIQUE USING 3D ARRAY BLOCK ROTATION

Author(s): G. Lokeshwari | Dr. S. Udaya Kumar | G. Aparna
BREAKING A FEISTEL-TYPE BLOCK CIPHER BY BACTERIA ENGINEERING

Author(s): Arash Karimi | Hadi Shahriar Shahhoseini
A New Approach for Improving Data Security using Iterative Blowfish Algorithm

Author(s): G. Manikandan | N. Sairam | M. Kamarasan
Data Hiding in JPEG Images

Author(s): S. K. Muttoo | Sushil Kumar
IMPLEMENTATION OF THE TRIPLE-DES BLOCK CIPHER USING VHDL

Author(s): Sai Praveen Venigalla | M. Nagesh Babu | Srinivas Boddu | G. Santhi Swaroop Vemana
Scheme of Encryption for Block Ciphers and Multi Code Generation Based on Secret Key

Author(s): P. Anuradha Kameswari | R. Chaya Kumari | L. Praveen Kumar
Developing a Block-Cipher-Key Generator Using Philosophy of Data Fusion Technique

Author(s): Soukaena H. Hashem | Mohammad A. AL-Hamami | Alaa H. AL-Hamami
Improving the Diffusion power of AES Rijndael with key multiplication

Author(s): Mohan H.S. | A. Raji Reddy | Manjunath T.N
The Platform Built Based on the Mode operations of AES and the Image Applications

Author(s): Chi-Wu Huang | Ying-Hao TU | Shih-Hao Liu | Hsing-Chang Yeh
A UNIFIED BLOCK AND STREAM CIPHER BASED FILE ENCRYPTION

Author(s): ganesan manikandan | ganesan krishnan | natarajan sairam
Design and Hardware Implementation of QoSS - AES Processor for Multimedia applications

Author(s): Zeghid Medien | Mohsen Machhout | Belgacem Bouallegue | Lazhar Khriji | Adel Baganne | Rached Tourki
Triple SV: A Bit Level Symmetric Block-Cipher Having High Avalanche Effect

Author(s): Rajdeep Chakraborty | Sonam Agarwal | Sridipta Misra | Vineet Khemka | Sunit Kr Agarwal | J. K. Mandal
Ensemble Of Blowfish With Chaos Based S Box Design For Text And Image Encryption

Author(s): Jeyamala Chandrasekaran | Subramanyan B | Raman G.S
Efficient Modular Adders for Scalable Encryption Algorithm

Author(s): K.J. Jegadish Kumar | K.Chenna Kesava | S. Salivahanan
Attack of Against Simplified Data Encryption Standard Cipher System Using Neural Networks

Author(s): Khaled M. Alallayah | Waiel F.A. El-Wahed | Mohamed Amin | Alaa H. Alhamami
Message Based Random Variable Length Key Encryption Algorithm

Author(s): Hamid Mirvaziri | Kasmiran J.M. Ismail | Zurina M. Hanapi
The New Variable-Length Key Symmetric Cryptosystem

Author(s): Davood R. Pour | Mohamad R.M. Said | Kamel A.M. Atan | Mohamed Othman
Why do you need a reservation system?      Save time & money - Smart Internet Solutions