Suchergebnisse - Derivation Cipher Key Algorithms
-
1
Design and Implementation of Derivation Cryptographic Algorithms in Embedded Contactless IC Card System
ISBN: 303785426X, 9783037854266ISSN: 1660-9336, 1662-7482, 1662-7482Veröffentlicht: Zurich Trans Tech Publications Ltd 01.06.2012Veröffentlicht in Applied Mechanics and Materials (01.06.2012)“… The paper studied the security measures of contactless IC card system. Derivation cryptographic algorithms were used in the embedded IC card system to generate …”
Volltext
Journal Article -
2
On Constructing a Secure and Fast Key Derivation Function Based on Stream Ciphers
ISSN: 2158-107X, 2156-5570Veröffentlicht: West Yorkshire Science and Information (SAI) Organization Limited 2024Veröffentlicht in International journal of advanced computer science & applications (2024)“… Existing standard secure functions for the key derivation function are based on stream ciphers, block ciphers, and hash functions …”
Volltext
Journal Article -
3
Key derivation function: key-hash based computational extractor and stream based pseudorandom expander
ISSN: 2376-5992, 2376-5992Veröffentlicht: United States PeerJ. Ltd 23.08.2024Veröffentlicht in PeerJ. Computer science (23.08.2024)“… The key derivation function is a specific cryptographic algorithm that transforms private string and public strings into one or more cryptographic keys …”
Volltext
Journal Article -
4
Digital Image Encryption Based on the RC5 Block Cipher Algorithm
ISSN: 1557-2064, 1557-2072Veröffentlicht: Boston Springer US 01.12.2011Veröffentlicht in Sensing and imaging (01.12.2011)“… The evaluation consists of theoretical derivations and practical experimentation. Experimental results have proved that the RC5 block cipher algorithm can be implemented …”
Volltext
Journal Article -
5
Lightweight and secure cipher scheme for multi-homed systems
ISSN: 1022-0038, 1572-8196Veröffentlicht: New York Springer US 01.10.2024Veröffentlicht in Wireless networks (01.10.2024)“… In this paper, a new and efficient dynamic and key-dependent cipher scheme is designed to secure multi-homed devices, in real-time, while preserving their main functionality and meeting the stringent …”
Volltext
Journal Article -
6
A new efficient lightweight and secure image cipher scheme
ISSN: 1380-7501, 1573-7721Veröffentlicht: New York Springer US 01.06.2018Veröffentlicht in Multimedia tools and applications (01.06.2018)“… The protection of multimedia content has become a key area of research, since very often …”
Volltext
Journal Article -
7
An Automated Fault Attack Framework for Block Ciphers Through Property Mining and Verification
ISSN: 1549-8328, 1558-0806Veröffentlicht: New York IEEE 01.01.2025Veröffentlicht in IEEE transactions on circuits and systems. I, Regular papers (01.01.2025)“… Fault attacks are effective side-channel attack methods for cryptanalysis. However, existing fault attack methods involve manual derivation of complex fault …”
Volltext
Journal Article -
8
Cryptanalysis of full PRIDE block cipher
ISSN: 1674-733X, 1869-1919Veröffentlicht: Beijing Science China Press 01.05.2017Veröffentlicht in Science China. Information sciences (01.05.2017)“… A study of the first subkey derivation function reveals that there exist three weak-key classes, as a result of which all the differences of subkeys for each round are identical …”
Volltext
Journal Article -
9
All-or-Nothing Key Derivation Function Based on Quasigroup String Transformation
Veröffentlicht: IEEE 01.12.2016Veröffentlicht in 2016 International Conference on Information Science and Security (ICISS) (01.12.2016)“… This paper proposed a new algorithm to minimize the use of cryptographic Hash function and ciphers as a key derivation function and to optimally mitigate the use of predefined public …”
Volltext
Tagungsbericht -
10
An image encryption scheme using PRESENT-RC4, chaos and secure key generation
ISSN: 2045-2322, 2045-2322Veröffentlicht: London Nature Publishing Group UK 28.11.2025Veröffentlicht in Scientific reports (28.11.2025)“… Traditional ciphers such as Rivest Cipher 4 (RC4) are fast but present challenges in the form of a biased keystream along with weak key scheduling …”
Volltext
Journal Article -
11
(Non-)Random Sequences from (Non-)Random Permutations—Analysis of RC4 Stream Cipher
ISSN: 0933-2790, 1432-1378Veröffentlicht: Boston Springer US 01.01.2014Veröffentlicht in Journal of cryptology (01.01.2014)“… RC4 has been the most popular stream cipher in the history of symmetric key cryptography …”
Volltext
Journal Article -
12
Efficient & Secure Physical Layer Cipher Scheme for VLC Systems
ISSN: 2577-2465Veröffentlicht: IEEE 01.09.2019Veröffentlicht in IEEE Vehicular Technology Conference (01.09.2019)“… A dynamic key derivation scheme that benefits from the dynamic properties of VLC channels is also proposed …”
Volltext
Tagungsbericht -
13
A New-Type Zeroing Neural Network Model and Its Application in Dynamic Cryptography
ISSN: 2471-285X, 2471-285XVeröffentlicht: Piscataway IEEE 01.02.2025Veröffentlicht in IEEE transactions on emerging topics in computational intelligence (01.02.2025)“… ) is a static alternative cipher based on the basic matrix theory. Stuck in the security and real-time issues of the THC with time-invariant key, this paper studies a dynamic novel Hill Cipher (NHC …”
Volltext
Journal Article -
14
Timing Side-Channel Attack Resistant Key Derivation Functions for Cryptosystems
Veröffentlicht: IEEE 01.12.2021Veröffentlicht in 2021 IEEE International Symposium on Smart Electronic Systems (iSES) (01.12.2021)“… of them. Key Derivation Functions (KDFs) are the basic and essential components of cryptographic systems …”
Volltext
Tagungsbericht -
15
Optimal design of vascular stents using a network of 1D slender curved rods
ISSN: 0045-7825Veröffentlicht: Amsterdam Elsevier B.V 01.05.2022Veröffentlicht in Computer methods in applied mechanics and engineering (01.05.2022)“… In this manuscript we present a mathematical theory and a computational algorithm to study optimal design of mesh-like structures such as metallic stents by changing the stent strut thickness …”
Volltext
Journal Article -
16
Provably secure counter mode with related-key-based internal re-keying
ISSN: 2263-8733, 2263-8733Veröffentlicht: Paris Springer Paris 01.12.2020Veröffentlicht in Journal of Computer Virology and Hacking Techniques (01.12.2020)“… Block cipher cryptanalysis in related-key adversary model is usually underestimated, since it is believed that the conditions of this model could be hardly achieved in practice …”
Volltext
Journal Article -
17
KBC: Multiple Key Generation using Key Block Chaining
ISSN: 1877-0509, 1877-0509Veröffentlicht: Elsevier B.V 2020Veröffentlicht in Procedia computer science (2020)“… (s). Hence, the key can be rewarded as a crucial part of any cryptographic algorithm. With the symmetric key, researchers have developed chaining concepts where the output of one operation becomes an input to the next one …”
Volltext
Journal Article -
18
Finding minimum gaps and designing key derivation functions
ISBN: 9781124632261, 1124632263Veröffentlicht: ProQuest Dissertations & Theses 01.01.2011“… The problem size gets larger as computers become faster. Using naive algorithms, even equipped with fast CPUs and large memories, computers still cannot handle many problems of certain size …”
Volltext
Dissertation -
19
Modified Blowfish Algorithm
ISSN: 2502-4752, 2502-4760Veröffentlicht: 01.10.2018Veröffentlicht in Indonesian Journal of Electrical Engineering and Computer Science (01.10.2018)“… A derivation was added to prevent symmetry. The algorithm’s performance was evaluated using time, and avalanche …”
Volltext
Journal Article -
20
Enhanced ARIA-based counter mode deterministic random bit generator random number generator implemented in verilog
ISSN: 2502-4752, 2502-4760Veröffentlicht: 01.03.2024Veröffentlicht in Indonesian Journal of Electrical Engineering and Computer Science (01.03.2024)“… ) IP in verilog language, based on the standard encryption algorithm. By controlling the existing round generation and key generation blocks, the internal modules of the counter mode deterministic random bit generator (CTR-DRBG …”
Volltext
Journal Article

