๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

On the security of the RC5 encryption algorithm

โœ Scribed by Kaliski B.S.


Book ID
127409354
Year
1998
Tongue
English
Weight
442 KB
Category
Library

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


On the security of image encryption meth
โœ Jan Jinn-Ke; Tseng Yuh-Min ๐Ÿ“‚ Article ๐Ÿ“… 1996 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 457 KB

Alexopoulos, Bourbakis and Ioannou proposed two cryptographic schemes for encrypting 2-D gray scale images by using a large family of fractals respectively. Their schemes are based on a transposition of the image elements. However, their schemes will be vulnerable in case that they employ the unique

The XTS-AES Disk Encryption Algorithm an
โœ Ball, Matthew V.; Guyot, Cyril; Hughes, James P.; Martin, Luther; Noll, Landon C ๐Ÿ“‚ Article ๐Ÿ“… 2012 ๐Ÿ› Taylor and Francis Group ๐ŸŒ English โš– 247 KB

This paper describes the importance of the XTS-AES encryption mode of operation and concludes with a new proof for the security of ciphertext stealing as used by XTS-AES. The XTS-AES mode is designed for encrypting data stored on hard disks where there is not additional space for an integrity field.