Showing 1 - 20 results of 29 for search '"Block cipher', query time: 0.05s Refine Results
  1. 1
  2. 2
    “… these problems solved in three directions. The first direction proposed lightweight block cipher algorithm called…”
    Get full text
    Get full text
  3. 3
    “…Block ciphers provide confidentiality by encrypting confidential messages into unintelligible form…”
    Get full text
    Get full text
    Get full text
    Get full text
  4. 4
    by Salim, Sufya, Taha, Imad
    Published 2012
    “…Although the AES is an excellent and preferred choice for almost all block cipher applications…”
    Get full text
    Get full text
    Get full text
  5. 5
    “… (Sboxes) for use in lightweight block ciphers. An S-box is commonly used in block ciphers to provide…”
    Get full text
    Get full text
    Get full text
    Get full text
  6. 6
    “…Lightweight block cipher algorithms are very important for constraint environment. This paper…”
    Get full text
    Get full text
    Get full text
  7. 7
    “…Lightweight block cipher algorithms are vital for constrained environment. It is easy to propose…”
    Get full text
    Get full text
    Get full text
  8. 8
    “…Lightweight block cipher algorithms are vital for constrained environment. There are many…”
    Get full text
    Get full text
    Get full text
    Get full text
  9. 9
    “… to use block ciphers are become very important. This paper presents a new block cipher based on finite…”
    Get full text
    Get full text
    Get full text
  10. 10
  11. 11
    “… on TS Block and Stream Ciphers, and is capable of protecting data at the data element, row, and column…”
    Get full text
    Get full text
    Get full text
  12. 12
  13. 13
  14. 14
  15. 15
    “… the template could be modified by attacker. Hill Cipher is a block cipher and symmetric key algorithm it has…”
    Get full text
    Get full text
    Get full text
  16. 16
  17. 17
    “…Lightweight block cipher algorithms are vital for constrained environment. Substitution box (S-box…”
    Get full text
    Get full text
    Get full text
    Get full text
  18. 18
    by Taha, Imad, Salim, Sufyan
    Published 2012
    “… primitives, lightweight block cipher plays a major role to secure RFID’s tag. One of the common lightweight…”
    Get full text
    Get full text
    Get full text
  19. 19
    by Nor Robaini, Ibrahim
    Published 2008
    “…), is an approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is a block…”
    Get full text
    Get full text
  20. 20
    “… called Gear in this paper. It is a hash function based on block cipher in Davies-Meyer mode. It uses…”
    Get full text
    Get full text
    Get full text
Search Tools: RSS Feed Email Search