Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
![]() |
On the security of TrCBCChakraborty, Debrup ; Kundu, SamirInformation processing letters, 2023-01, Vol.179, p.106320, Article 106320 [Periódico revisado por pares]Elsevier B.VTexto completo disponível |
2 |
Material Type: Artigo
|
![]() |
Suitable encrypting algorithms in Parallel Processing for improved efficiencyTallapally, Sampath Kumar ; Manjula, B.IOP conference series. Materials Science and Engineering, 2020-12, Vol.981 (2), p.22017 [Periódico revisado por pares]Bristol: IOP PublishingTexto completo disponível |
3 |
Material Type: Artigo
|
![]() |
How to Formalize Loop Iterations in Cryptographic Protocols Using ProVerifMieno, Takehiko ; Okazaki, Hiroyuki ; Arai, Kenichi ; Futa, YuichiIEEE access, 2024, Vol.12, p.31605-31625 [Periódico revisado por pares]IEEETexto completo disponível |
4 |
Material Type: Artigo
|
![]() |
Periodicity Detection of the Substitution Box in the CBC Mode of Operation: Experiment and StudyAlimzhanova, Zhanna ; Skublewska-Paszkowska, Maria ; Nazarbayev, DaurenIEEE access, 2023, Vol.11, p.75686-75695 [Periódico revisado por pares]Piscataway: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)Texto completo disponível |
5 |
Material Type: Artigo
|
![]() |
Analysis of the security level of modified CBC algorithm cryptography using avalanche effectAstuti, N R D P ; Arfiani, I ; Aribowo, EIOP conference series. Materials Science and Engineering, 2019-11, Vol.674 (1), p.12056 [Periódico revisado por pares]Bristol: IOP PublishingTexto completo disponível |
6 |
Material Type: Artigo
|
![]() |
A Survey on Authenticated Encryption--ASIC Designer's PerspectiveKavun, Elif ; Mihajloska, Hristina ; Yalçin, TolgaACM computing surveys, 2018-01, Vol.50 (6), p.1-21 [Periódico revisado por pares]Baltimore: ACMTexto completo disponível |
7 |
Material Type: Artigo
|
![]() |
Secured cloud SCADA system implementation for industrial applicationsOsman, Fawzy A. ; Hashem, Mohamed Y. M. ; Eltokhy, Mostafa A. R.Multimedia tools and applications, 2022-03, Vol.81 (7), p.9989-10005 [Periódico revisado por pares]New York: Springer USTexto completo disponível |
8 |
Material Type: Artigo
|
![]() |
An Efficient Certificate-Based Data Integrity Auditing Protocol for Cloud-Assisted WBANsLi, Yumei ; Zhang, FutaiIEEE internet of things journal, 2022-07, Vol.9 (13), p.11513-11523Piscataway: IEEETexto completo disponível |
9 |
Material Type: Artigo
|
![]() |
Security of medical images based on special orthogonal group and Galois fieldJoshi, Anand B. ; Gaffar, Abdul ; Singh, SonaliMultimedia tools and applications, 2023-11, Vol.82 (28), p.44277-44308 [Periódico revisado por pares]New York: Springer USTexto completo disponível |
10 |
Material Type: Artigo
|
![]() |
Matrix Power Function Based Block Cipher Operating in CBC ModeDindiene, Lina ; Mihalkovich, Aleksejus ; Luksys, Kestutis ; Sakalauskas, EligijusMathematics (Basel), 2022-06, Vol.10 (12), p.2123 [Periódico revisado por pares]Basel: MDPI AGTexto completo disponível |