Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
Lecture Notes in Computer Science, 1998
2017
In this paper, we describe a family of block ciphers named SHIPHER. We present a symmetric encryption framework based on a cryptographic hash function and dynamic operators controlled by small random numbers. This dynamic operator mixes operations from different algebraic groups like IDEA [1]. However, unlike IDEA and extended IDEA ([2], [3]), modular addition is the only calculation in this framework and this makes SHIPHER highly efficient. The round function was chosen to provide confusion and diffusion to facilitate hardware implementations. This framework can provide families of secure, flexible, and variable-key-length block ciphers. Anny block size can be achieved. We have extensively investigated our encryption framework. We can easily control the computational cost by selecting block size, implementation method, and a hash function. Also, this framework offers excellent performance and it is flexible and generic enough to admit a variety of implementations on different dynam...
Selected Areas in Cryptography, 2004
Lecture Notes in Computer Science
Defence Science Journal, 2016
International data encryption algorithm (IDEA) is a secret key or symmetric key block cipher. The purpose of IDEA was to replace data encryption standard (DES) cipher, which became practically insecure due to its small key size of 56 bits and increase in computational power of systems. IDEA cipher mainly to provide data confidentiality in variety of applications such as commercial and financial application e.g. pretty good privacy (PGP) protocol. Till 2015, no successful linear or algebraic weaknesses IDEA of have been reported. In this paper, author explained IDEA cipher, its application in PGP and did a systematic survey of various attacks attempted on IDEA cipher. The best cryptanalysis result which applied to all keys could break IDEA up to 6 rounds out of 8.5 rounds of the full IDEA cipher1. But the attack requires 264 known plaintexts and 2126.8 operations for reduced round version. This attack is practically not feasible due to above mention mammoth data and time requirements...
Aestimatio: Critical Reviews in the History of Science, 2016
Εισαγωγικό μάθημα του Μαθήματος "Μεθοδολογία έρευνας και συγγραφή επιστημονικής μελέτης" (κωδ. 1799) για το Τμήμα Θεολογίας, ΑΠΘ
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
in «Raffaello. 500 anni dopo», a cura di Andrea Zezza, Rosanna Cioffi, Riccardo Lattuada, Officina Libraria, Roma 2024, pp. 191-204, 2024
International Journal of Nursing Studies, 2011
Academia Letters, 2021
Journal of Neurosurgery: Spine, 2006
Debates em Psiquiatria, 2021
American Journal of Respiratory and Critical Care Medicine, 1999
Panamerican Journal of Trauma, Critical Care & Emergency Surgery
Auladuna : Jurnal Prodi Pendidikan Guru Madrasah Ibtidaiyah
SHS Web of Conferences, 2017