-
1Academic Journal
المؤلفون: Niranjan Balachandran, Ashwin Jha, Mridul Nandi, Soumit Pal
المصدر: IACR Transactions on Symmetric Cryptology, Vol 2023, Iss 4 (2023)
مصطلحات موضوعية: CBC-MAC, cascade construction, tight bound, missing proofs, Computer engineering. Computer hardware, TK7885-7895
وصف الملف: electronic resource
-
2Academic Journal
المؤلفون: Balachandran, Niranjan, Jha, Ashwin, Nandi, Mridul, Pal, Soumit
المصدر: IACR Transactions on Symmetric Cryptology; Vol. 2023 No. 4; 391-419 ; 2519-173X
مصطلحات موضوعية: CBC-MAC, cascade construction, tight bound, missing proofs
وصف الملف: application/pdf
-
3Academic Journal
المؤلفون: Laila, Inas, Alkhatib, Hla
المصدر: مجلة جامعة تشرين للبحوث والدراسات العلمية- سلسلة العلوم الهندسية; مجلد 42 عدد 3 (2020): مجلة جامعة تشرين للبحوث والدراسات العلمية- سلسلة العلوم الهندسية ; Tishreen University Journal -Engineering Sciences Series,; Vol. 42 No. 3 (2020): Tishreen University Journal for Research and Scientific Studies - Engineering Sciences Series ; 2663-4279 ; 2079-3081
مصطلحات موضوعية: الأمن, شبكات الحساسات اللاسلكية, بروتوكولات التوجيه الهرمي, التشفير المتناظر, كلفة الطاقة, التوجيه الآمن, Block Cipher, LEACH, SecLEACH, MS-LEACH, AES, RC5, Skipjack, رمز مصادقة الرسالة, CBC-MAC HMAC ماتلاب, security, WSN, Hierarchical Routing Protocols, Symmetric cryptography, Energy-cost, Secure routing, Message authentication code, CBC-MAC, HMAC, MatLab
وصف الملف: application/pdf
-
4Academic Journal
المؤلفون: Inas Laila, Hla Alkhatib
المصدر: مجلة جامعة تشرين للبحوث والدراسات العلمية- سلسلة العلوم الهندسية, Vol 42, Iss 3 (2020)
مصطلحات موضوعية: الأمن, شبكات الحساسات اللاسلكية, بروتوكولات التوجيه الهرمي, التشفير المتناظر, كلفة الطاقة, التوجيه الآمن, Block Cipher, LEACH, SecLEACH, MS-LEACH, AES, RC5, Skipjack, رمز مصادقة الرسالة, , CBC-MAC HMAC ماتلاب., Engineering (General). Civil engineering (General), TA1-2040, Education
وصف الملف: electronic resource
-
5Academic Journal
المؤلفون: Bellare, Mihir, Rogaway, Phillip, Wagner, David
المصدر: Fast Software Encryption. 3017
مصطلحات موضوعية: authenticated encryption, CCM, EAX, message authentication, CBC MAC, modes of operation, OMAC, provable security
وصف الملف: application/pdf
URL الوصول: https://escholarship.org/uc/item/7330c85m
-
6Academic Journal
المؤلفون: Chung-Wen Hung, Wen-Ting Hsu
المصدر: Sensors; Volume 18; Issue 6; Pages: 1675
مصطلحات موضوعية: power consumption, Internet of Things (IoT), Advanced Encryption Standard (AES), Electronic Codebook Mode (ECB), Counter with CBC-MAC (CCM), Message Integrity Check (MIC)
وصف الملف: application/pdf
Relation: Sensor Networks; https://dx.doi.org/10.3390/s18061675
الاتاحة: https://doi.org/10.3390/s18061675
-
7
المؤلفون: Anshuman Singh, Mahmoud Yousef, Krishna Prasad Nandeti
مصطلحات موضوعية: S-box, Theoretical computer science, CBC-MAC, Middletext, Computer science, Key (cryptography), Substitution-permutation network, Selection (genetic algorithm), Block cipher
-
8Academic Journal
المؤلفون: Pcdvb Pccvb, Pcdvb Pccvb Pcdvb
المساهمون: The Pennsylvania State University CiteSeerX Archives
مصطلحات موضوعية: CBC-MAC Cipher Block Chaining Message Authentication Code
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.673.6346; http://www.commoncriteriaportal.org/files/epfiles/0710b_pdf.pdf
-
9Academic Journal
المؤلفون: M. Bellare, K. Pietrzak, P. Rogaway
المساهمون: The Pennsylvania State University CiteSeerX Archives
مصطلحات موضوعية: CBC MAC, message authentication, provable security
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.75.6459; http://www.cs.ucdavis.edu/~rogaway/papers/cbc2.pdf
-
10Academic Journal
المؤلفون: M. Bellare, P. Rogaway
المساهمون: The Pennsylvania State University CiteSeerX Archives
مصطلحات موضوعية: CBC MAC, cryptographic analysis techniques, games, provable security
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.98.3696; http://cr.yp.to.mirror.dogmap.org/bib/2004/bellare-games.pdf
-
11Academic Journal
المؤلفون: M. Bellare, P. Rogaway, D. Wagner
المساهمون: The Pennsylvania State University CiteSeerX Archives
مصطلحات موضوعية: Authenticated encryption, CCM, EAX, message authentication, CBC MAC, modes of operation, OMAC, provable security
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.79.9508; http://www.cs.ucdavis.edu/~rogaway/papers/eax.pdf
-
12Academic Journal
المؤلفون: P. Rogawayy, D. Wagnerz
المساهمون: The Pennsylvania State University CiteSeerX Archives
مصطلحات موضوعية: Authenticated encryption, CCM, EAX, message authentication, CBC MAC, modes of operation, OMAC, provable security
وصف الملف: application/postscript
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.66.5377; http://www-cse.ucsd.edu/users/mihir/papers/eax.ps
-
13
المؤلفون: Thomas De Cnudde, Svetla Nikova
المصدر: IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 25:3291-3301
مصطلحات موضوعية: Triple DES, Block cipher mode of operation, CBC-MAC, Computer science, business.industry, 020208 electrical & electronic engineering, Cryptography, 02 engineering and technology, Ciphertext stealing, Computer security, computer.software_genre, Hardware and Architecture, Embedded system, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, Substitution-permutation network, Side channel attack, Electrical and Electronic Engineering, business, computer, Software, Block cipher
-
14
المؤلفون: Shivanku Mahna, Pooja Prashar
المصدر: International Journal of Computer Applications. 175:1-4
مصطلحات موضوعية: Block cipher mode of operation, Triple DES, CBC-MAC, business.industry, Computer science, Two-square cipher, Ciphertext stealing, Key whitening, business, Stream cipher, Computer hardware, Block cipher
-
15
المؤلفون: Syed Haroon Hasan, Zuber Farooqui
المصدر: International Journal of Computer Applications. 173:49-53
مصطلحات موضوعية: Triple DES, Block cipher mode of operation, CBC-MAC, Cipher, Computer science, Two-square cipher, Ciphertext stealing, Arithmetic, Key whitening, Transposition cipher
-
16
المؤلفون: Mohammad Reza Khayyambashi, Narges Mehran
المصدر: International Journal of Computer Network and Information Security. 9:30-37
مصطلحات موضوعية: Block cipher mode of operation, Triple DES, Authentication, CBC-MAC, Computer Networks and Communications, business.industry, Computer science, Applied Mathematics, 020206 networking & telecommunications, 02 engineering and technology, Ciphertext stealing, Encryption, 01 natural sciences, Computer Science Applications, 010309 optics, Digital image, 0103 physical sciences, 0202 electrical engineering, electronic engineering, information engineering, business, Safety Research, Software, Information Systems, Computer network, Block cipher
-
17
المؤلفون: Dr.Senthil Kumar K, Dayananda Lal N
المصدر: International Journal of Engineering and Technology. 9:3115-3129
مصطلحات موضوعية: Triple DES, Block cipher mode of operation, CBC-MAC, Cryptographic primitive, Computer science, General Engineering, Meet-in-the-middle attack, MDC-2, Cryptographic protocol, Computer security, computer.software_genre, computer, Key exchange
-
18
المؤلفون: Eik List, Stefan Lucks, Jakob Wenzel, Christian Forler
المصدر: Cryptography and Communications. 10:177-193
مصطلحات موضوعية: Triple DES, Theoretical computer science, Differential cryptanalysis, CBC-MAC, Computer Networks and Communications, Computer science, Applied Mathematics, Stream cipher attack, Two-square cipher, 0102 computer and information sciences, 02 engineering and technology, 01 natural sciences, Computational Theory and Mathematics, Cipher, 010201 computation theory & mathematics, Ciphertext, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, Transposition cipher
-
19
المؤلفون: Liang-Chieh Cheng, Yunpeng Zhang, Xin Liu, Yongqiang Ma
المصدر: Cluster Computing. 20:3119-3130
مصطلحات موضوعية: Key Wrap, Block cipher mode of operation, Triple DES, CBC-MAC, Computer Networks and Communications, Computer science, Distributed computing, Key distribution, Cryptography, 02 engineering and technology, computer.software_genre, Encryption, Multiple encryption, Filesystem-level encryption, 0202 electrical engineering, electronic engineering, information engineering, Secure transmission, Key exchange, Block cipher, business.industry, 020207 software engineering, Deterministic encryption, Symmetric-key algorithm, Probabilistic encryption, Key (cryptography), 40-bit encryption, 56-bit encryption, 020201 artificial intelligence & image processing, Attribute-based encryption, On-the-fly encryption, business, computer, Software
-
20
المؤلفون: Goutham L
المصدر: International Journal for Research in Applied Science and Engineering Technology. :342-345
مصطلحات موضوعية: Triple DES, Block cipher mode of operation, CBC-MAC, Computer science, Two-square cipher, 02 engineering and technology, 010501 environmental sciences, Key whitening, 01 natural sciences, Hill cipher, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, Arithmetic, 0105 earth and related environmental sciences, Block cipher, Transposition cipher