A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Block Cipher Algorithm Based on Magic Square for Secure E-bank Systems
2022
Computers Materials & Continua
Due to a decrease in the time of encrypting and decrypting, as well as the usage of the central processing unit (CPU), efficiency is improved. ...
Nowadays the E-bank systems witnessed huge growth due to the huge developments in the internet and technologies. ...
Which conflicts with the requirement of fast encryption algorithm for real-time systems [25] [26] [27] [28] [29] . ...
doi:10.32604/cmc.2022.027582
fatcat:tm6ub56nfvhi3jxjvs63364dae
Single-bit re-encryption with applications to distributed proof systems
2007
Proceedings of the 2007 ACM workshop on Privacy in electronic society - WPES '07
We examine the implementation of the distributed proof system designed by Minami and Kotz [17]. ...
We find that, although a high-level analysis shows that it preserves confidentiality, the implementation of the cryptographic primitives contains a covert channel that can leak information. ...
with the final version of the paper. ...
doi:10.1145/1314333.1314341
dblp:conf/wpes/BorisovM07
fatcat:mtujpttyuneyljmiq63od3ikwy
Design hybrid encryption system based on E0 algorithm and A5/3 algorithm in the encryption process
2018
Al-Qadisiyah Journal Of Pure Science
The purpose of this paper is to create the safer hybrid system ,the more secure and fast , by the merge A5/3 algorithm with E0 algorithm, so as to produce bluetooth algorithm relies on block cipher. ...
Some modifications were done on both algorithms in order to correspond the work of each algorithm with other, that would speed up the labor of the algorithm in the calculation of the total time-spent and ...
the our system with systems " A5/3 algorithm and E0 algorithm" separately.
13-Specification of the A5/3 Encryption
Algorithms for GSM and ECSD, and the
GEA3 Encryption Algorithm for GPRS; Design ...
doi:10.29350/jops.2018.23.2.764
fatcat:t3e7byb5h5evxffbfbcgyjlv4u
Cube-Type Algebraic Attacks on Wireless Encryption Protocols
2009
Computer
For efficiency-in speed, size, and power consumption-the system uses the E0 (128-bit) stream cipher instead of one of the widely used block ciphers. ...
By skillfully choosing some publicly settable bits, the attacker can replace the degree of the polynomial that represents the encryption function with a system of linear equations. ...
doi:10.1109/mc.2009.318
fatcat:4zqnguqai5bnrgbd2ie56faiau
Dynamical properties of ion-acoustic waves in space plasma and its application to image encryption
2021
IEEE Access
In addition complexity analysis shows the possibility of practical implementation of the proposed algorithm. ...
Applying the wave transformation, the governing equations are deduced into a dynamical system (DS). Supernonlinear and nonlinear periodic IAWs are presented through phase plane analysis. ...
Kengne Jacques for his inestimable broad knowledge, common sense, and ability to analyze intricate problems crucial to the success of this research work. ...
doi:10.1109/access.2021.3054250
fatcat:737mdfandbagfawpwajumppqvq
An Integrated Scheme based on Triple DES, RSA and MD5 to Enhance the Security in Bluetooth Communication
2012
International Journal of Computer Applications
This scheme is based on Triple DES, RSA and MD5.Triple DES algorithm (variant of DES) is used for encryption, which is more secure in comparison to DES. RSA is used to encrypt the key of triple DES. ...
Message digest Algorithm MD5 is adopted in this mechanism to verify the integrity of the message. ...
Li juan Chen Bin, Li Kun, 2009[3] proposed the solution to the limitations of the E0 stream cipher that is used in Bluetooth System, the proposed system uses DES algorithm. ...
doi:10.5120/7787-0884
fatcat:xf4doaha2zhszpgn5ke5koaxnu
Improving wireless security through network diversity
2008
Computer communication review
them, on top of the availability or strength of underlying encryption techniques. ...
Second, in an effort towards provable security, we analyze the security of our model in the wiretap channel framework of information theory and characterize the secrecy capacity of our system. ...
Thus conceptually the overlay sits between the encryption and decryption functions of the underlying cipher E0. ...
doi:10.1145/1496091.1496096
fatcat:jlm3vjatbvdd7frxhiu73q3umq
Image Encryption Algorithm Based on a Novel Six-Dimensional Hyper- Chaotic System
2020
Mustansiriyah Journal of Science
In recent years, the chaotic system of image encryption becomes an efficient way to encrypt images due to its high security. ...
The performance of the algorithm has been analyzed through analyzes statistical such as Histogram Analysis, Correlation Coefficient Analysis, Information Entropy Analysis, Key Space Analysis, Key Sensitivity ...
Therefore, the equilibrium E0(0,0,0,0,0,0) is a saddle point, and the hyperchaotic system is unstable at the point 1. ...
doi:10.23851/mjs.v31i1.739
fatcat:qoufntyqivfxrejrbdpfqove4i
Performance Analysis of AES Algorithm on MPC Processor
2015
Open Cybernetics and Systemics Journal
Test results show that the maximum encryption speed of AES algorithm is nearly 21MB/s under the circumstance of our experiment. ...
In this paper, we firstly study the theory of AES algorithm and then conduct performance analysis of AES algorithm on MPC processor whose frequency is 800MHz according to the superscalar pipeline of E600 ...
,r12,4 D I - - E0 E0
Analysis of Execution Time based on Superscalar Pipeline In this fraction, we analyze the execution time of memory access instruction of AES algorithm basing on superscalar pipeline ...
doi:10.2174/1874110x01509012248
fatcat:gnb6ivzqdfcpxhd5ggpundefry
Provable-Security Analysis of Authenticated Encryption Based on Lesamnta-LW in the Ideal Cipher Model
2021
IEICE transactions on information and systems
In this paper, we analyze the security of Lae0 in the ideal cipher model. Our result implies about 120-bit security for instantiation with the block cipher of Lesamnta-LW. ...
Unfortunately, their result implies only about 64-bit security for instantiation with the dedicated block cipher of Lesamnta-LW. ...
Acknowledgments The first author was supported in part by JSPS KAKENHI Grant Number JP18H05289. ...
doi:10.1587/transinf.2021ngp0008
fatcat:ftvt4azxgrgezlineh6ybdbvkq
Design and Analysis of a Novel Six-Dimensional Hyper Chaotic System
2020
Mustansiriyah Journal of Science
gives an analysis of the new systems. ...
The results of the analysis exhibit that the new system contains three unstable equilibrium points and the six Lyapunov exponents. ...
The speed analysis shows that the proposed encryption algorithm is highly encrypted, consistent with the best solutions in a region. ...
doi:10.23851/mjs.v31i4.901
fatcat:63sa24iexnbb7ck3zwmiacoctq
Privacy preserving electronic data gathering
2005
Mathematical and computer modelling
Analysis of these databases can be very beneficial to the owner organizations, as it contributes to knowledge discovery, rib extract broader and more accurate conclusions, knowledge discovery techniques ...
need to be applied on a collection of databases of different organizations involved in the same field. ...
The public key E0 is used by all Aliees for the encryption of all packages A s to zj = Eo(Aj). ...
doi:10.1016/j.mcm.2005.09.003
fatcat:ysnhb5xn5zbpjnqk4vijbbef2y
Static validation of security protocols
2005
Journal of Computer Security
We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. ...
We then apply static analysis technology to develop an automatic validation procedure for protocols. ...
We show the semantic correctness of the analysis and demonstrate that best solutions (in the manner of principal types for type systems) always exist. ...
doi:10.3233/jcs-2005-13302
fatcat:clyyodohf5hyznyz45fun2ysga
Non-repudiation analysis using LySa with annotations
2010
Computer languages, systems & structures
This work introduces a formal analysis of the non-repudiation property for security protocols. Protocols are modelled in the process calculus LySa, using an extended syntax with annotations. ...
Non-repudiation is verified using a Control Flow Analysis, following the same approach of Buchholtz and Gao for authentication and freshness analyses. ...
,E k g E0 Symmetric encryption fjE 1 , . . . ,E k jg E0 Asymmetric encryption P :: ¼ Processes /E 1 , . . . ,E k S:P Output (E 1 ,y,E j ; x j + 1 ,y,x k ).P Input decrypt E as fE 1 , . . . ...
doi:10.1016/j.cl.2010.04.002
fatcat:zgnelkafpzcujlypauerihaaoq
ANALYSIS OF RC4 ENCRYPTION ALGORITHM
2019
Bulletin of the Novosibirsk Computing Center Series Computer Science
Over the last three decades of research and development in stream ciphers, a number of designs have been proposed and analyzed by the cryptology community. ...
The most important and cryptographically significant goal of a stream cipher is to produce a pseudorandom sequence of bits or words using a fixed length secret key, often paired with a fixed length public ...
Later, the public description was verified by comparing the outputs of the leaked design with those of the licensed systems using proprietary versions of the original cipher. ...
doi:10.31144/bncc.cs.2542-1972.2019.n43.p53-60
fatcat:qnv7twhmwnczdjevlhksgznjru
« Previous
Showing results 1 — 15 out of 854 results