Journal articles on the topic 'Cipher suites'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 49 journal articles for your research on the topic 'Cipher suites.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Lara, Evangelina, Leocundo Aguilar, Jesús García, and Mauricio Sanchez. "A Lightweight Cipher Based on Salsa20 for Resource-Constrained IoT Devices." Sensors 18, no. 10 (October 4, 2018): 3326. http://dx.doi.org/10.3390/s18103326.
Full textFan, Xin Xin, Teng Wu, and Guang Gong. "An Efficient Stream Cipher WG-16 and its Application for Securing 4G-LTE Networks." Applied Mechanics and Materials 490-491 (January 2014): 1436–50. http://dx.doi.org/10.4028/www.scientific.net/amm.490-491.1436.
Full textAlamer, Ahmed, Ben Soh, and David E. Brumbaugh. "MICKEY 2.0.85: A Secure and Lighter MICKEY 2.0 Cipher Variant with Improved Power Consumption for Smaller Devices in the IoT." Symmetry 12, no. 1 (December 22, 2019): 32. http://dx.doi.org/10.3390/sym12010032.
Full textArunkumar, B., and G. Kousalya. "Secure and Light Weight Elliptic Curve Cipher Suites in SSL/TLS." Computer Systems Science and Engineering 40, no. 1 (2022): 179–90. http://dx.doi.org/10.32604/csse.2022.018166.
Full textFadhli, Muhamad, Fityan Ali Munshi, and Taufik Adi Wicaksono. "Ancaman Keamanan pada Transport Layer Security." Jurnal ULTIMA Computing 7, no. 2 (August 1, 2016): 70–75. http://dx.doi.org/10.31937/sk.v7i2.234.
Full textArunkumar, B., and G. Kousalya. "Nonce reuse/misuse resistance authentication encryption schemes for modern TLS cipher suites and QUIC based web servers." Journal of Intelligent & Fuzzy Systems 38, no. 5 (May 29, 2020): 6483–93. http://dx.doi.org/10.3233/jifs-179729.
Full textSuárez-Albela, Manuel, Paula Fraga-Lamas, Luis Castedo, and Tiago Fernández-Caramés. "Clock Frequency Impact on the Performance of High-Security Cryptographic Cipher Suites for Energy-Efficient Resource-Constrained IoT Devices." Sensors 19, no. 1 (December 20, 2018): 15. http://dx.doi.org/10.3390/s19010015.
Full textYerukala, Nagendar, V. Kamakshi Prasad, and Allam Apparao. "Performance and Statistical Analysis of Stream ciphers in GSM Communications." Journal of communications software and systems 16, no. 1 (March 15, 2020): 11–18. http://dx.doi.org/10.24138/jcomss.v16i1.892.
Full textSuárez-Albela, Manuel, Paula Fraga-Lamas, and Tiago Fernández-Caramés. "A Practical Evaluation on RSA and ECC-Based Cipher Suites for IoT High-Security Energy-Efficient Fog and Mist Computing Devices." Sensors 18, no. 11 (November 10, 2018): 3868. http://dx.doi.org/10.3390/s18113868.
Full textHieu, Minh Nguyen, Duy Ho Ngoc, Canh Hoang Ngoc, Trung Dinh Phuong, and Manh Tran Cong. "New primitives of controlled elements F2/4 for block ciphers." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 5 (October 1, 2020): 5470. http://dx.doi.org/10.11591/ijece.v10i5.pp5470-5478.
Full textNannipieri, Pietro, Stefano Di Matteo, Luca Baldanzi, Luca Crocetti, Jacopo Belli, Luca Fanucci, and Sergio Saponara. "True Random Number Generator Based on Fibonacci-Galois Ring Oscillators for FPGA." Applied Sciences 11, no. 8 (April 7, 2021): 3330. http://dx.doi.org/10.3390/app11083330.
Full textKumar, Manoj, Dhananjoy Dey, Saibal K. Pal, and Anupama Panigrahi. "HeW: AHash Function based on Lightweight Block Cipher FeW." Defence Science Journal 67, no. 6 (November 6, 2017): 636. http://dx.doi.org/10.14429/dsj.67.10791.
Full textZakaria, Nur Hafiza, Azuan Ahmad, Azni Haslizan Ab Halim, and Farida Hazwani Mohd Ridzuan. "SECURITY ANALYSIS BETWEEN STATIC AND DYNAMIC S-BOXES IN BLOCK CIPHERS." Journal of Information System and Technology Management 6, no. 20 (March 15, 2021): 10–16. http://dx.doi.org/10.35631/jistm.620002.
Full textKlyucharev, P. G. "On Statistical Testing of Block Ciphers." Mathematics and Mathematical Modeling, no. 5 (November 12, 2018): 35–56. http://dx.doi.org/10.24108/mathm.0518.0000132.
Full textFigueroa-Lorenzo, Añorga, and Arrizabalaga. "A Role-Based Access Control Model in Modbus SCADA Systems. A Centralized Model Approach." Sensors 19, no. 20 (October 14, 2019): 4455. http://dx.doi.org/10.3390/s19204455.
Full textNugrahtama, Aghnia Luthfy, and Yogha Restu Pramadi. "Implementation of salsa20 stream cipher algorithm as an alternative cipher suite SSL-VPN for VOIP security." IOP Conference Series: Materials Science and Engineering 508 (May 2, 2019): 012132. http://dx.doi.org/10.1088/1757-899x/508/1/012132.
Full textYeşiltepe, Mirsat, Beyza Yılmaz, Özge Yeni, and Muhammet Kurulay. "Sort of Turkey's top 20 banks by cipher suite value." Global Journal of Computer Science 5, no. 2 (December 31, 2015): 74. http://dx.doi.org/10.18844/gjcs.v5i2.181.
Full textBaldanzi, Luca, Luca Crocetti, Francesco Falaschi, Matteo Bertolucci, Jacopo Belli, Luca Fanucci, and Sergio Saponara. "Cryptographically Secure Pseudo-Random Number Generator IP-Core Based on SHA2 Algorithm." Sensors 20, no. 7 (March 27, 2020): 1869. http://dx.doi.org/10.3390/s20071869.
Full textHerzberg, Amir, and Haya Shulman. "Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End?" IEEE Internet Computing 19, no. 1 (January 2015): 80–84. http://dx.doi.org/10.1109/mic.2015.3.
Full textAli Ebrahim, Seham Muawadh. "Hybrid Chaotic Method for Medical Images Ciphering." International Journal of Network Security & Its Applications 12, no. 6 (November 30, 2020): 1–14. http://dx.doi.org/10.5121/ijnsa.2020.12601.
Full textSeniman, Seniman, Baihaqi Siregar, Rani Masyithah Pelle, and Fahmi Fahmi. "Securing sensor data transmission with ethernet elliptic curve cryptography secure socket layer on STM32F103 device." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (April 1, 2021): 507. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp507-515.
Full textBucerzan, Dominic, Mihaela Crăciun, Violeta Chiș, and Crina Rațiu. "Stream Ciphers Analysis Methods." International Journal of Computers Communications & Control 5, no. 4 (November 1, 2010): 483. http://dx.doi.org/10.15837/ijccc.2010.4.2506.
Full textKhalid, Ayesha, Goutam Paul, and Anupam Chattopadhyay. "RC4-AccSuite: A Hardware Acceleration Suite for RC4-Like Stream Ciphers." IEEE Transactions on Very Large Scale Integration (VLSI) Systems 25, no. 3 (March 2017): 1072–84. http://dx.doi.org/10.1109/tvlsi.2016.2606554.
Full textPayingat, Jilna, and Deepthi P. Pattathil. "Pseudorandom Bit Sequence Generator for Stream Cipher Based on Elliptic Curves." Mathematical Problems in Engineering 2015 (2015): 1–16. http://dx.doi.org/10.1155/2015/257904.
Full textTANG, K. W., WALLACE K. S. TANG, and K. F. MAN. "A CHAOS-BASED PSEUDO-RANDOM NUMBER GENERATOR AND ITS APPLICATION IN VOICE COMMUNICATIONS." International Journal of Bifurcation and Chaos 17, no. 03 (March 2007): 923–33. http://dx.doi.org/10.1142/s021812740701763x.
Full textSong, Ling, Yi Tu, Danping Shi, and Lei Hu. "Security analysis of Subterranean 2.0." Designs, Codes and Cryptography 89, no. 8 (June 1, 2021): 1875–905. http://dx.doi.org/10.1007/s10623-021-00892-6.
Full textGarcía-Martínez, M., and E. Campos-Cantón. "Pseudo-random bit generator based on lag time series." International Journal of Modern Physics C 25, no. 04 (March 6, 2014): 1350105. http://dx.doi.org/10.1142/s0129183113501052.
Full textKANSO, ALI. "SEARCH-BASED CHAOTIC PSEUDORANDOM BIT GENERATOR." International Journal of Bifurcation and Chaos 19, no. 12 (December 2009): 4227–35. http://dx.doi.org/10.1142/s0218127409025316.
Full textShaukat Jamal, Sajjad, Dawood Shah, Abdulaziz Deajim, and Tariq Shah. "The Effect of the Primitive Irreducible Polynomial on the Quality of Cryptographic Properties of Block Ciphers." Security and Communication Networks 2020 (September 24, 2020): 1–14. http://dx.doi.org/10.1155/2020/8883884.
Full textTouil, Hamza, Nabil El Akkad, and Khalid Satori. "Secure and Guarantee QoS in a Video Sequence: A New Approach Based on TLS Protocol to Secure Data and RTP to Ensure Real-Time Exchanges." International Journal of Safety and Security Engineering 11, no. 1 (February 28, 2021): 59–68. http://dx.doi.org/10.18280/ijsse.110107.
Full textBellemou, Ahmed Mohamed, Antonio García, Encarnación Castillo, Nadjia Benblidia, Mohamed Anane, José Antonio Álvarez-Bermejo, and Luis Parrilla. "Efficient Implementation on Low-Cost SoC-FPGAs of TLSv1.2 Protocol with ECC_AES Support for Secure IoT Coordinators." Electronics 8, no. 11 (October 30, 2019): 1238. http://dx.doi.org/10.3390/electronics8111238.
Full textOruganti, Ramkrishna, Saurabh Shah, Yohan Pavri, Neelansh Prasad, and Prathamesh Churi. "JSSecure: A Secured Encryption Strategy for Payment Gateways in E-Commerce." Circulation in Computer Science 2, no. 5 (June 20, 2017): 13–17. http://dx.doi.org/10.22632/ccs-2017-252-17.
Full textYadav, Anil, Sujata Pandey, Rajat Singh, and Nitin Rakesh. "Design of psk based trusted dtls for smart sensor nodes." Recent Advances in Computer Science and Communications 13 (July 8, 2020). http://dx.doi.org/10.2174/2666255813999200708135353.
Full textDaemen, Joan, Pedro Maat Costa Massolino, Alireza Mehrdad, and Yann Rotella. "The Subterranean 2.0 Cipher Suite." IACR Transactions on Symmetric Cryptology, June 22, 2020, 262–94. http://dx.doi.org/10.46586/tosc.v2020.is1.262-294.
Full textCanteaut, Anne, Sébastien Duval, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Thomas Pornin, and André Schrottenloher. "Saturnin: a suite of lightweight symmetric algorithms for post-quantum security." IACR Transactions on Symmetric Cryptology, June 22, 2020, 160–207. http://dx.doi.org/10.46586/tosc.v2020.is1.160-207.
Full textMikhalev, Vasily, Frederik Armknecht, and Christian Müller. "On Ciphers that Continuously Access the Non-Volatile Key." IACR Transactions on Symmetric Cryptology, February 3, 2017, 52–79. http://dx.doi.org/10.46586/tosc.v2016.i2.52-79.
Full textEddla, Padmalatha, and R. Ravinder Reddy. "Performance Analysis Of Secured Synchronous Stream Ciphers." International Journal of Communication Networks and Security, October 2011, 22–26. http://dx.doi.org/10.47893/ijcns.2011.1015.
Full text"Secure password-based cipher suite for TLS." ACM Transactions on Information and System Security 4, no. 2 (May 2001): 134–57. http://dx.doi.org/10.1145/501963.501965.
Full text"Compact Reconfigurable Architecture for Sosemanuk Stream Cipher." International Journal of Engineering and Advanced Technology 9, no. 3 (February 29, 2020): 607–11. http://dx.doi.org/10.35940/ijeat.c5252.029320.
Full textChaigneau, Colin, and Henri Gilbert. "Is AEZ v4.1 Sufficiently Resilient Against Key-Recovery Attacks?" IACR Transactions on Symmetric Cryptology, December 1, 2016, 114–33. http://dx.doi.org/10.46586/tosc.v2016.i1.114-133.
Full textBrunetta, Carlo, and Pablo Picazo-Sanchez. "Modelling cryptographic distinguishers using machine learning." Journal of Cryptographic Engineering, July 1, 2021. http://dx.doi.org/10.1007/s13389-021-00262-x.
Full textBožinovski, Adrijan, Biljana Stojčevska, and Veno Pačovski. "Enumeration, Ranking and Generation of Binary Trees Based on Level-Order Traversal Using Catalan Cipher Vectors." JITA - Journal of Information Technology and Applications (Banja Luka) - APEIRON 6, no. 2 (December 25, 2013). http://dx.doi.org/10.7251/jit1302078b.
Full text"Energy-Efficient and High-throughput Implementations of Lightweight Block Cipher." International Journal of Innovative Technology and Exploring Engineering 9, no. 2S (December 31, 2019): 35–41. http://dx.doi.org/10.35940/ijitee.b1022.1292s19.
Full textJean, Jérémy, Thomas Peyrin, Siang Meng Sim, and Jade Tourteaux. "Optimizing Implementations of Lightweight Building Blocks." IACR Transactions on Symmetric Cryptology, December 15, 2017, 130–68. http://dx.doi.org/10.46586/tosc.v2017.i4.130-168.
Full textHassan Abdelwahab, Zakaria, Talaat A. Elgarf, and Abdelhalim Zekry. "Analyzing SNOW and ZUC Security Algorithms Using NIST SP 800-22 and Enhancing their Randomness." Journal of Cyber Security and Mobility, February 9, 2021. http://dx.doi.org/10.13052/jcsm2245-1439.943.
Full textDobraunig, Christoph, Maria Eichlseder, Stefan Mangard, Florian Mendel, Bart Mennink, Robert Primas, and Thomas Unterluggauer. "Isap v2.0." IACR Transactions on Symmetric Cryptology, June 22, 2020, 390–416. http://dx.doi.org/10.46586/tosc.v2020.is1.390-416.
Full textOzcan Asilkan, Dogan Ibrahim &. "Table of Contents." Global Journal of Computer Science 5, no. 2 (December 31, 2015). http://dx.doi.org/10.18844/gjcs.v5i2.177.
Full textBaumann, Peter, Dimitar Misev, Vlad Merticariu, and Bang Pham Huu. "Array databases: concepts, standards, implementations." Journal of Big Data 8, no. 1 (February 2, 2021). http://dx.doi.org/10.1186/s40537-020-00399-2.
Full textIndex, GCS. "Volume 5 Index." Global Journal of Computer Science 5, no. 2 (January 7, 2016). http://dx.doi.org/10.18844/gjcs.v5i2.214.
Full text