Reconfigurable hardware implementations of tweakable enciphering schemes

C Mancillas-López, D Chakraborty… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
Tweakable enciphering schemes are length-preserving block cipher modes of operation that
provide a strong pseudorandom permutation. It has been suggested that these schemes can …

A proposed non feistel block cipher algorithm

AA Mohammed, AO Ibad - Qalaai Zanist Journal, 2017 - journal.lfu.edu.krd
In this work, A proposed block cipher algorithm is designed with multiple of 32 bits as a
length of block performed in heterogonous multiple block cipher dependent on the …

Area-efficient parallel reconfigurable stream processor for symmetric cryptograph

Y Zhu, Z Xing, J Xue, Z Li, Y Hu, Y Zhang, Y Li - IEEE Access, 2021 - ieeexplore.ieee.org
Represented by application-specific instruction set processors (ASIPs) and array
processors, existing cryptographic processors face challenges in application to mobile …

Об одном режиме работы блочных шифров, используемом для защиты информации на носителях с блочно-ориентированной структурой

GV Firsov, AM Koreneva - … информационные технологии и ИТ …, 2022 - sitito.cs.msu.ru
Аннотация В 2021 году в Российской Федерации технический комитет по
стандартизации «Криптографическая защита информации»(ТК 26) принял …

Tweakable parallel OFB mode of operation with delayed thread synchronization

B Damjanović, D Simić - Security and Communication …, 2016 - Wiley Online Library
Introduction of various cryptographic modes of operation is induced with noted imperfections
of symmetric block algorithms. Design of some cryptographic modes of operation has …

Redes neuronales para la desencriptación de mensajes codificados con atractores caóticos

SD Núñez Sánchez - repository.udistrital.edu.co
The work focuses on developing a new text encryption model that combines neural networks
and chaotic attractors to enhance the security of encoded messages. The project aims to …

[PDF][PDF] Aplicación de cifrado contra adversarios clasificadores, para el correo electrónico

J Arcos Ayala, AU Zepeda Ibarra - tesis.ipn.mx
En este reporte técnico se explica el desarrollo de una herramienta de cifrado que
protegerá al correo electrónico, contra un tipo especial de adversario, denominado …

[PDF][PDF] Design of One-Coincidence Frequency Hopping Sequence Sets for FHMA Systems

TH Lee - 2019 - core.ac.uk
In the thesis, we discuss frequency hopping multiple access (FHMA) systems and
construction of optimal frequency hopping sequence and applications. Moreover, FHMA is …

[PDF][PDF] Transmisión Confidencial de Video en Dispositivos Móviles

NAR García - 2019 - escom.ipn.mx
Mobile devices are currently a tool used to capture videos; Which may be sensitive
information thus require a method that guarantees confidentiality, ie only authorized users …

[PDF][PDF] Transmisión confidencial de video en dispositivos móviles

NA Ramírez García - 2019 - tesis.ipn.mx
Los dispositivos móviles en la actualidad son una herramienta utilizada en la captura de
videos; los cuales, pueden contener información sensible que necesita transmitirse y por …