Tresc: Towards redesigning existing symmetric ciphers

HN Noura, O Salman, N Kaaniche, N Sklavos… - Microprocessors and …, 2021 - Elsevier
Recently, the security of existing symmetric cryptographic algorithms and protocols has been
threatened by new performance challenges and vulnerabilities. In this paper, we propose a …

Methods and tools for analysis of symmetric cryptographic primitives

O Kazymyrov - 2014 - bora.uib.no
The development of modern cryptography is associated with the emergence of computing
machines. Since specialized equipment for protection of sensitive information was initially …

Comparison and hybrid implementation of blowfish, twofish and rsa cryptosystems

M Iavich, S Gnatyuk, E Jintcharadze… - 2019 IEEE 2nd …, 2019 - ieeexplore.ieee.org
Generally, encryption it's an encoding information process in order to provided security
against unauthorized access. Nowadays, there are different types of cryptographic methods …

Design large symmetric algorithm for securing big data

OA Dawood, AM Sagheer… - 2018 11th International …, 2018 - ieeexplore.ieee.org
Today several Institutions, organizations, companies and research centers deal with
hundreds of gigabytes or terabytes of the massive amount of renewable data every day. This …

[PDF][PDF] Evaluation of performance of the Symmetric Key Algorithms: DES, 3DES, AES and Blowfish

PC Mandal - Journal of Global Research in Computer Science, 2012 - Citeseer
Internet and networks applications are growing very fast. So the importance and the value of
the exchanged data over the internet are increasing. Information Security has been very …

Implementation of symmetric block ciphers using gpgpu

N Nishikawa, K Iwai… - … Conference on Cyber …, 2012 - search.proquest.com
Battlefield systems have been shifting to Network-Centric Warfare since the Gulf War (1991).
In such systems, computers are connected via encrypted networks, which require …

Security enhancement of blowfish block cipher

R Patel, P Kamboj - Smart Trends in Information Technology and …, 2016 - Springer
Cryptography is the first line of defense to protect the data from intruder. Symmetric
cryptography and asymmetric cryptography are two cryptographic based algorithms that …

New asymmetric cipher based on matrix power function and its implementation in microprocessors efficiency investigation

A Mihalkovich, E Sakalauskas… - Elektronika ir …, 2013 - epubl.ktu.edu
Abstract [eng] The efficiency of realization of a new asymmetric cipher in microprocessors is
presented. The cipher is based on the matrix power function and therefore to the contrary of …

[PDF][PDF] Survey: Block cipher Methods

F RadiHamade - … Journal of Advancements in Research & …, 2016 - researchgate.net
Symmetric key block cipher for different algorithms presented in this field according to
classified it in cryptography where we classified into categories. first, Mode of operation …

[PDF][PDF] A comparison of symmetric key algorithms DES, AES, Blowfish, RC4, RC6: A survey

P Princy - International Journal of Computer Science & …, 2015 - ijcset.com
Cryptography or cryptology is a Greek word it means' hidden'. It involves the blotting out of
the specials meaning of letters, but not their existence. It is the one of the main categories of …