Web
Education
A Secured Smart Card using a Pseudorandom Affine ...
The proposed LIRKES needs a strong pseudorandom permutation (PRP) as its basic building block, so we introduce a new symmetric-key block cipher, with variable block and key lengths, referred to as PATFC (Pseudorandom Affine Transformation based Feistel Cipher), appropriate for software and hardware implementations....
EHAB, YASIEN, and FURUKAWA A Secured Smart Card Using a ...
The proposed LIRKES needs a strong pseudorandom permutation (PRP) as its basic building block, so we introduce a new symmetric-key block cipher, with variable block and key lengths, referred to as PATFC (Pseudorandom Affine Transformation based Feistel Cipher), appropriate for software and hardware implementations....
A Secured Smart Card Using a Pseudorandom Affine ...
Request PDF | A Secured Smart Card Using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES | The RKES (Remotely Keyed Encryption Schemes) are greatly useful in solvingthe ...
(PDF) A Secured Smart Card using a Pseudorandom Affine ...
A Secured Smart Card using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES
A Secured Smart Card Using a Pseudorandom Affine ... - CORE
A Secured Smart Card Using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES . By Ehab Mahmoud Mohamed, Yasien Mahmoud and Hiroshi Furukawa. ... so an adversary can’t forge the scheme.The proposed LIRKES needs a strong pseudorandom permutation (PRP) as itsbasic building block, so we introduce a new symmetric-key block ...
From stream to provably secure block ciphers based on ...
A Secured Smart Card Using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES. Article. ... that is based on a pseudorandom affine transformation (constructed using a highly ...
List of Open Access publications for International Journal ...
A Secured Smart Card using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES : Ehab Mahmoud Mohamed, Yasien Mahmoud, Hiroshi Furukawa : Pages - 9 - 22 | Revised - 25-02-2010 | Published - 26-03-2010 : Full Text Available (187.85KB) MORE INFORMATION
Assiut University Members CV|Dr Yassin Mahmoud Yassin Hassan,
Hasan, and Hiroshi Furukawa, Novel Remotely Keyed Encryption Schemes for Smart Card Applications,” In Proc. of the IEEE International Conference on Communications – ICC 2011: Communication and Information System Security Symposium , Kyoto, Japan, 2011: 6 - Ammar. M. Hassan, Ayoub Al-Hamadi, Yassin M. Y. Hasan, Mohamed A. A. Wahab, Axel ...
International Journal of Computer Science and Security ...
Academic Journals Database is a universal index of periodical literature covering basic research from all fields of knowledge, and is particularly strong in medical research, humanities and social sciences. Full-text from most of the articles is available. Academic Journals Database contains complete bibliographic citations, precise indexing, and informative abstracts for papers from a wide ...
EP1379023B1 - En- and Decryption Method executed by an ...
EP1379023B1 EP03300046A EP03300046A EP1379023B1 EP 1379023 B1 EP1379023 B1 EP 1379023B1 EP 03300046 A EP03300046 A EP 03300046A EP 03300046 A EP03300046 A EP 03300046A EP 1379023 B1 EP1379023 B1 EP 1379023B1 Authority EP European Patent Office Prior art keywords transformation r2 blocks method code Prior art date 2002-07-02 Legal status (The legal status is an assumption and is not a legal ...
|
iSEEK provides users with a Favorites library that allows them easy access to their most-used websites from any computer. If you have an iSEEK account, the content you just selected can be added to your Favorites page to be revisited any time you want.
If you would like to join the iSEEK community, click the "Register" button below to create your free iSEEK account. The resource you have selected will be added to your new Favorites library after you sign in for the first time.
If you already have an iSEEK account, click the button below to sign in and add the resource to your Favorites library.