Výsledky vyhľadávania - Derivation Cipher Key Algorithms

  1. 1

    Design and Implementation of Derivation Cryptographic Algorithms in Embedded Contactless IC Card System Autor Li, Ping, Fang, Xiang Qun, Ge, Hai Bo

    ISBN: 303785426X, 9783037854266
    ISSN: 1660-9336, 1662-7482, 1662-7482
    Vydavateľské údaje: Zurich Trans Tech Publications Ltd 01.06.2012
    Vydané v Applied Mechanics and Materials (01.06.2012)
    “…The paper studied the security measures of contactless IC card system. Derivation cryptographic algorithms were used in the embedded IC card system to generate…”
    Získať plný text
    Journal Article
  2. 2

    On Constructing a Secure and Fast Key Derivation Function Based on Stream Ciphers Autor Chuah, Chai Wen, Alawatugoda, Janaka, Arbaiy, Nureize

    ISSN: 2158-107X, 2156-5570
    Vydavateľské údaje: West Yorkshire Science and Information (SAI) Organization Limited 2024
    “… Existing standard secure functions for the key derivation function are based on stream ciphers, block ciphers, and hash functions…”
    Získať plný text
    Journal Article
  3. 3

    Key derivation function: key-hash based computational extractor and stream based pseudorandom expander Autor Chuah, Chai Wen, Harun, Nur Ziadah, Hamid, Isredza Rahmi A.

    ISSN: 2376-5992, 2376-5992
    Vydavateľské údaje: United States PeerJ. Ltd 23.08.2024
    Vydané v PeerJ. Computer science (23.08.2024)
    “…The key derivation function is a specific cryptographic algorithm that transforms private string and public strings into one or more cryptographic keys…”
    Získať plný text
    Journal Article
  4. 4

    Digital Image Encryption Based on the RC5 Block Cipher Algorithm Autor Faragallah, Osama S.

    ISSN: 1557-2064, 1557-2072
    Vydavateľské údaje: Boston Springer US 01.12.2011
    Vydané v Sensing and imaging (01.12.2011)
    “… The evaluation consists of theoretical derivations and practical experimentation. Experimental results have proved that the RC5 block cipher algorithm can be implemented…”
    Získať plný text
    Journal Article
  5. 5

    Lightweight and secure cipher scheme for multi-homed systems Autor Noura, Hassan N., Melki, Reem, Malli, Mohammad, Chehab, Ali

    ISSN: 1022-0038, 1572-8196
    Vydavateľské údaje: New York Springer US 01.10.2024
    Vydané v Wireless networks (01.10.2024)
    “… In this paper, a new and efficient dynamic and key-dependent cipher scheme is designed to secure multi-homed devices, in real-time, while preserving their main functionality and meeting the stringent…”
    Získať plný text
    Journal Article
  6. 6

    A new efficient lightweight and secure image cipher scheme Autor Noura, Hassan, Sleem, Lama, Noura, Mohamad, Mansour, Mohammad M., Chehab, Ali, Couturier, Raphaël

    ISSN: 1380-7501, 1573-7721
    Vydavateľské údaje: New York Springer US 01.06.2018
    Vydané v Multimedia tools and applications (01.06.2018)
    “…The protection of multimedia content has become a key area of research, since very often…”
    Získať plný text
    Journal Article
  7. 7

    An Automated Fault Attack Framework for Block Ciphers Through Property Mining and Verification Autor Wang, Xingxin, Hu, Wei, Tang, Shibo, Wang, Xinxin, Zhou, Huisi

    ISSN: 1549-8328, 1558-0806
    Vydavateľské údaje: New York IEEE 01.01.2025
    “…Fault attacks are effective side-channel attack methods for cryptanalysis. However, existing fault attack methods involve manual derivation of complex fault…”
    Získať plný text
    Journal Article
  8. 8

    Cryptanalysis of full PRIDE block cipher Autor Dai, Yibin, Chen, Shaozhen

    ISSN: 1674-733X, 1869-1919
    Vydavateľské údaje: Beijing Science China Press 01.05.2017
    Vydané v Science China. Information sciences (01.05.2017)
    “… A study of the first subkey derivation function reveals that there exist three weak-key classes, as a result of which all the differences of subkeys for each round are identical…”
    Získať plný text
    Journal Article
  9. 9

    All-or-Nothing Key Derivation Function Based on Quasigroup String Transformation Autor Disina, Abdulkadir Hassan, Jamel, Sapiee, Pindar, Zahraddeen Abubakar, Deris, Mustafa Mat

    Vydavateľské údaje: IEEE 01.12.2016
    “… This paper proposed a new algorithm to minimize the use of cryptographic Hash function and ciphers as a key derivation function and to optimally mitigate the use of predefined public…”
    Získať plný text
    Konferenčný príspevok..
  10. 10

    An image encryption scheme using PRESENT-RC4, chaos and secure key generation Autor Kumar, Krishna, Roy, Satyabrata, Puri, Dev, Kumar, Ravinder

    ISSN: 2045-2322, 2045-2322
    Vydavateľské údaje: London Nature Publishing Group UK 28.11.2025
    Vydané v Scientific reports (28.11.2025)
    “… Traditional ciphers such as Rivest Cipher 4 (RC4) are fast but present challenges in the form of a biased keystream along with weak key scheduling…”
    Získať plný text
    Journal Article
  11. 11

    (Non-)Random Sequences from (Non-)Random Permutations—Analysis of RC4 Stream Cipher Autor Sen Gupta, Sourav, Maitra, Subhamoy, Paul, Goutam, Sarkar, Santanu

    ISSN: 0933-2790, 1432-1378
    Vydavateľské údaje: Boston Springer US 01.01.2014
    Vydané v Journal of cryptology (01.01.2014)
    “…RC4 has been the most popular stream cipher in the history of symmetric key cryptography…”
    Získať plný text
    Journal Article
  12. 12

    Efficient & Secure Physical Layer Cipher Scheme for VLC Systems Autor Melki, Reem, Noura, Hassan N., Chehab, Ali

    ISSN: 2577-2465
    Vydavateľské údaje: IEEE 01.09.2019
    Vydané v IEEE Vehicular Technology Conference (01.09.2019)
    “… A dynamic key derivation scheme that benefits from the dynamic properties of VLC channels is also proposed…”
    Získať plný text
    Konferenčný príspevok..
  13. 13

    A New-Type Zeroing Neural Network Model and Its Application in Dynamic Cryptography Autor Zhu, Jingcan, Jin, Jie, Chen, Chaoyang, Wu, Lianghong, Lu, Ming, Ouyang, Aijia

    ISSN: 2471-285X, 2471-285X
    Vydavateľské údaje: Piscataway IEEE 01.02.2025
    “…) is a static alternative cipher based on the basic matrix theory. Stuck in the security and real-time issues of the THC with time-invariant key, this paper studies a dynamic novel Hill Cipher (NHC…”
    Získať plný text
    Journal Article
  14. 14

    Timing Side-Channel Attack Resistant Key Derivation Functions for Cryptosystems Autor Lata, Kusum, Bansal, Abhishek

    Vydavateľské údaje: IEEE 01.12.2021
    “… of them. Key Derivation Functions (KDFs) are the basic and essential components of cryptographic systems…”
    Získať plný text
    Konferenčný príspevok..
  15. 15

    Optimal design of vascular stents using a network of 1D slender curved rods Autor Čanić, Sunčica, Grubišić, Luka, Lacmanović, Domagoj, Ljulj, Matko, Tambača, Josip

    ISSN: 0045-7825
    Vydavateľské údaje: Amsterdam Elsevier B.V 01.05.2022
    “…In this manuscript we present a mathematical theory and a computational algorithm to study optimal design of mesh-like structures such as metallic stents by changing the stent strut thickness…”
    Získať plný text
    Journal Article
  16. 16

    Provably secure counter mode with related-key-based internal re-keying Autor Alekseev, Evgeny K., Goncharenko, Kirill S., Marshalko, Grigory B.

    ISSN: 2263-8733, 2263-8733
    Vydavateľské údaje: Paris Springer Paris 01.12.2020
    “…Block cipher cryptanalysis in related-key adversary model is usually underestimated, since it is believed that the conditions of this model could be hardly achieved in practice…”
    Získať plný text
    Journal Article
  17. 17

    KBC: Multiple Key Generation using Key Block Chaining Autor Prajapati, Payal, Chaudhari, Kinjal

    ISSN: 1877-0509, 1877-0509
    Vydavateľské údaje: Elsevier B.V 2020
    Vydané v Procedia computer science (2020)
    “…(s). Hence, the key can be rewarded as a crucial part of any cryptographic algorithm. With the symmetric key, researchers have developed chaining concepts where the output of one operation becomes an input to the next one…”
    Získať plný text
    Journal Article
  18. 18

    Finding minimum gaps and designing key derivation functions Autor Li, Yu-Hsin

    ISBN: 9781124632261, 1124632263
    Vydavateľské údaje: ProQuest Dissertations & Theses 01.01.2011
    “…The problem size gets larger as computers become faster. Using naive algorithms, even equipped with fast CPUs and large memories, computers still cannot handle many problems of certain size…”
    Získať plný text
    Dissertation
  19. 19

    Modified Blowfish Algorithm Autor Quilala, Theda Flare Ginoy, Sison, Ariel M, Medina, Ruji P

    ISSN: 2502-4752, 2502-4760
    Vydavateľské údaje: 01.10.2018
    “… A derivation was added to prevent symmetry.  The algorithm’s performance was evaluated using time, and avalanche…”
    Získať plný text
    Journal Article
  20. 20

    Enhanced ARIA-based counter mode deterministic random bit generator random number generator implemented in verilog Autor Rhee, Eugene, Lee, Jihoon

    ISSN: 2502-4752, 2502-4760
    Vydavateľské údaje: 01.03.2024
    “…) IP in verilog language, based on the standard encryption algorithm. By controlling the existing round generation and key generation blocks, the internal modules of the counter mode deterministic random bit generator (CTR-DRBG…”
    Získať plný text
    Journal Article