Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
1 2 3 4 5
Pages
|
Viewing 1-10 of 44 total results
A Secured Smart Card using a Pseudorandom Affine ...
The proposed LIRKES needs a strong pseudorandom permutation (PRP) as its basic building block, so we introduce a new symmetric-key block cipher, with variable block and key lengths, referred to as PATFC (Pseudorandom Affine Transformation based Feistel Cipher), appropriate for software and hardware implementations....
EHAB, YASIEN, and FURUKAWA A Secured Smart Card Using a ...
The proposed LIRKES needs a strong pseudorandom permutation (PRP) as its basic building block, so we introduce a new symmetric-key block cipher, with variable block and key lengths, referred to as PATFC (Pseudorandom Affine Transformation based Feistel Cipher), appropriate for software and hardware implementations....
A Secured Smart Card Using a Pseudorandom Affine ...
Request PDF | A Secured Smart Card Using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES | The RKES (Remotely Keyed Encryption Schemes) are greatly useful in solvingthe ...
A Secured Smart Card Using a Pseudorandom Affine ... - CORE
A Secured Smart Card Using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES . By Ehab Mahmoud Mohamed, Yasien Mahmoud and Hiroshi Furukawa. ... so an adversary can’t forge the scheme.The proposed LIRKES needs a strong pseudorandom permutation (PRP) as itsbasic building block, so we introduce a new symmetric-key block ...
https://core.ac.uk/display/25875643
Average Rating (0 votes)
From stream to provably secure block ciphers based on ...
A Secured Smart Card Using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES. Article. ... that is based on a pseudorandom affine transformation (constructed using a highly ...
List of Open Access publications for International Journal ...
A Secured Smart Card using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES : Ehab Mahmoud Mohamed, Yasien Mahmoud, Hiroshi Furukawa : Pages - 9 - 22 | Revised - 25-02-2010 | Published - 26-03-2010 : Full Text Available (187.85KB) MORE INFORMATION
Assiut University Members CV|Dr Yassin Mahmoud Yassin Hassan,
Hasan, and Hiroshi Furukawa, Novel Remotely Keyed Encryption Schemes for Smart Card Applications,” In Proc. of the IEEE International Conference on Communications – ICC 2011: Communication and Information System Security Symposium , Kyoto, Japan, 2011: 6 - Ammar. M. Hassan, Ayoub Al-Hamadi, Yassin M. Y. Hasan, Mohamed A. A. Wahab, Axel ...
International Journal of Computer Science and Security ...
Academic Journals Database is a universal index of periodical literature covering basic research from all fields of knowledge, and is particularly strong in medical research, humanities and social sciences. Full-text from most of the articles is available. Academic Journals Database contains complete bibliographic citations, precise indexing, and informative abstracts for papers from a wide ...
EP1379023B1 - En- and Decryption Method executed by an ...
EP1379023B1 EP03300046A EP03300046A EP1379023B1 EP 1379023 B1 EP1379023 B1 EP 1379023B1 EP 03300046 A EP03300046 A EP 03300046A EP 03300046 A EP03300046 A EP 03300046A EP 1379023 B1 EP1379023 B1 EP 1379023B1 Authority EP European Patent Office Prior art keywords transformation r2 blocks method code Prior art date 2002-07-02 Legal status (The legal status is an assumption and is not a legal ...
1 2 3 4 5
Pages
|