IEEE Organizations related to Ciphers

Back to Top

No organizations are currently tagged "Ciphers"



Conferences related to Ciphers

Back to Top

2019 X Southern Conference on Programmable Logic (SPL)

SPL is a Conference for researchers and developers interested on reconfigurable logictechnology and its applications. The main topics include:Hardware Design Methodology, FPGAin Education, Platform-based Design, Applications, Custom Computers and DSPs, EDA Tools,Aerospace Applications.


2018 26th Telecommunications Forum (TELFOR)

TELFOR has the purpose to consider important scientific, engineering, professional, social, economical and legal aspects of Telecommunications and Information Technology. The work of TELFOR is organized through plenary sessions, invited papers, lectures, regular authors and students paper sessions, tutorials, seminars, workshops, technical, information and commercial presentations, exhibitions, etc.

  • 2017 25th Telecommunication Forum (TELFOR)

    ScopeTELFOR intends to consider important scientific, engineering, professional, social, economical and legal aspects of Telecommunications and Information Technology. The work of TELFOR is organized through plenary and special sessions, authors regular and student paper sessions, invited papers, lectures, seminats, workshops, technical, informative and commercial presentations, exhibitions, ...

  • 2016 24th Telecommunications Forum (TELFOR)

    TELFOR intends to consider important scientific, engineering, professional, social, economical and legal aspects of Telecommunications and Information Technology. The work of TELFOR is organized through plenary and special sessions, authors regular and student paper sessions, invited papers, lectures, seminars, workshops, technical, informative and commercial presentations, exhibitions, ...

  • 2015 23rd Telecommunications Forum Telfor (TELFOR)

    TELFOR has the purpose to consider important scientific, engineering, professional, social, economical and legal aspects of Telecommunications and Information Technology. The work of TELFOR is organized through plenary sessions, invited papers, lectures, regular authors and students paper sessions, tutorials, seminars, workshops, technical, information and commercial presentations, exhibitions, etc.

  • 2014 22nd Telecommunications Forum Telfor (TELFOR)

    TELFOR has the purpose to consider important scientific, engineering, professional, social, economical and legal aspects of Telecommunications and Information Technology. The work of TELFOR is organized through plenary sessions, invited papers, presentations, lectures, regular authors' and students' sessions, tutorial, seminars, workshops, technical and commercial presentations, exhibitions, etc.

  • 2013 21st Telecommunications Forum Telfor (TELFOR)

    TELFOR has the purpose to consider important scientific, engineering, professional, social, economical and legal aspects of Telecommunications and Information Technology. The work of TELFOR is organized through plenary sessions, invited papers, presentations, lectures, regular authors' and students' sessions, tutorial, seminars, workshops, technical and commercial presentations, exhibitions, etc.

  • 2012 20th Telecommunications Forum Telfor (TELFOR)

    TELFOR has the purpose to consider important scientific, engineering, professional, social, economical and legal aspects of Telecommunications and Information Technology. The work of TELFOR is organized through plenary sessions, invited papers, presentations, lectures, regular authors' and students' sessions, tutorial, seminars, workshops, technical and commercial presentations, exhibitions, etc.

  • 2011 19th Telecommunications Forum Telfor (TELFOR)

    TELFOR has the purpose to consider important scientific, engineering, professional, social, economical and legal aspects of Telecommunications and Information Technology. The work of TELFOR is organized through plenary sessions, invited papers presentations, lectures, regular authors' and students' sessions, tutorials, seminars, workshops, technical and commercial presentations, exhibitions, etc.


2018 5th International Conference on Systems and Informatics (ICSAI)

ICSAI aims to be a premier international forum for scientists and researchers to present the state of the art of systems and informatics. Topics of interest include Control and Automation Systems, Power and Energy Systems, Intelligent Systems, Computer Systems and Applications, Communications and Networking, Image, Video, and Signal Processing, Data Engineering and Data Mining, Software Engineering, and Industrial Informatics.

  • 2017 4th International Conference on Systems and Informatics (ICSAI)

    ICSAI aims to be a premier international forum for scientists and researchers to present the state of the art of systems and informatics. Topics of interest include Control and Automation Systems, Power and Energy Systems, Intelligent Systems, Computer Systems and Applications, Communications and Networking, Image, Video, and Signal Processing, Data Engineering and Data Mining, Software Engineering, and Industrial Informatics.

  • 2016 3rd International Conference on Systems and Informatics (ICSAI)

    ICSAI aims to be a premier international forum for scientists and researchers to present the state of the art of systems and informatics. Topics of interest include Control and Automation Systems, Power and Energy Systems, Intelligent Systems, Computer Systems and Applications, Communications and Networking, Image, Video, and Signal Processing, Data Engineering and Data Mining, Software Engineering, and Industrial Informatics.

  • 2014 2nd International Conference on Systems and Informatics (ICSAI)

    ICSAI 2014 aims to be a premier international forum for scientists and researchers to present the state of the art of systems and informatics. Topics of interest include Control and Automation Systems, Power and Energy Systems, Intelligent Systems, Computer Systems and Applications, Awareness Computing, Communications and Networking, Image, Video, and Signal Processing, Data Engineering and Data Mining, Software Engineering, and Industrial Informatics.

  • 2012 International Conference on Systems and Informatics (ICSAI)

    ICSAI 2012 aims to be a premier international forum for scientists and researchers to present the state of the art of systems and informatics.


2018 8th International Conference on Communication Systems and Network Technologies (CSNT)

•Communication systems and Communicaiton Standards • Soft computing, Fuzzy Systems and ANN • Sensors and sensor networks• Security and authentication• Air Interface, Wavepropagation and Antennas• Mathematical Modeling and simulation• Data Mining, Web Technology and Ontology • Parallel and distributed systems• Microwave Theory and Techniques •Microwave Devices and Circuits • Adhoc Networks and wireless networks • IT and Management • RFIDs and applicatons• Embedded systems design and Hardware Implementation • Cloud computing, Green Computing• Vehicular Technology and networks• Image, speech and Signal Processing • Computer Vision and AI• Biometry and Bio-informatics

  • 2017 7th International Conference on Communication Systems and Network Technologies (CSNT)

    Tracks; •Communication systems and Communicaiton Standards • Soft computing, Fuzzy Systems and ANN • Sensors and sensor networks• Acoustic and under water communication• Security and authentication• Air Interface, Wavepropagation and Antennas• Mathematical Modeling and simulation• Data Mining, Web Technology and Ontology • Parallel and distributed systems• Microwave Theory and Techniques •Microwave Devices and Circuits • Adhoc Networks and wireless networks • IT and Management • RFIDs and applicatons• Embedded systems design and Hardware Implementation • Cloud computing, Green Computing• Vehicular Technology and networks• Image, speech and Signal Processing • Computer Vision and AI• Biometry and Bio-informatics • Information security and Network security • Simulation and Hardware implementation techniques• Nano Technology • Remote sensing • E-commerce • Robotics and Mecatronics• Control systems, Power Systems, transmission system • Big Data and Interne

  • 2016 6th International Conference on Communication Systems and Network Technologies (CSNT)

    •Computational Intelligence: Algorithm,Application • Soft computing, Fuzzy Systems and ANN • Sensors and sensor networks• Acoustic and under water communication• Security and authentication• Air Interface, Wavepropagation and Antennas• Mathematical Modeling and simulation• Data Mining, Web Technology and Ontology • Parallel and distributed systems• Microwave Theory and Techniques •Microwave Devices and Circuits • Mobile communication and Adhoc Networks• IT and Management • RFIDs and applicatons• Embedded systems design and Hardware Implementation • Cloud and Green Computing • Vehicular Technology and networks• Image, speech and Signal Processing • Computer Vision and AI• Biometry and Bio-informatics • Information security and Network security • Simulation and Hardware implementation techniques• Nano Technology • Remote sensing

  • 2015 Fifth International Conference on Communication Systems and Network Technologies (CSNT)

    The International Conference on Communication Systems and Network Technologies 2015(CSNT-2015) aims to bring together researchers, engineers, developers and practitioners from academia and industry working in all major areas and interdisciplinary areas of computational intelligence, Communication systems, computer networks and soft computing to share their experience, and exchange and cross-fertilize their ideas. CSNT 2015 will be conducted at Bhopal, India. Papers are invited on the following track but not limited to:

  • 2014 International Conference on Communication Systems and Network Technologies (CSNT)

    The International Conference on Communication Systems and Network Technologies 2014 aims to bring together researchers, engineers, developers and practitioners from academia and industry working in all major areas and interdisciplinary areas of computational intelligence, Communication systems, computer networks and soft computing to share their experience, and exchange and cross-fertilize their ideas. CSNT 2014 will be conducted at Kolkata, India. Papers are invited on the following track but not limited to:Tracks;

  • 2013 International Conference on Communication Systems and Network Technologies (CSNT)

    The International Conference on Communication Systems and Network Technologies 2013 aims to bring together researchers, engineers, developers and practitioners from academia and industry working in all major areas and interdisciplinary areas of computational intelligence, Communication systems, computer networks and soft computing to share their experience, and exchange and cross-fertilize their ideas. CSNT 2013 will be conducted at Gwalior, India. Papers are invited on the following track but not limited to:Tracks;

  • 2012 International Conference on Communication Systems and Network Technologies (CSNT)

    The International Conference on Communication Systems and Network Technologies (CSNT-2012) is organized to address various issues to prosper the creation of intelligent solutions in future. The aim is to bring together worldwide leading researchers, developers, practitioners and educators interested in advancing the state of the art in computational intelligence and communication Networks for exchanging knowledge that encompasses a broad range of disciplines among various distinct communities. It is expected that researchers will bring new prospect for collaboration across disciplines and gain idea facilitating novel breakthrough. The theme for this conference is Innovating and Inspiring the researchers to adopt the outcome for implementation.

  • 2011 International Conference on Communication Systems and Network Technologies (CSNT)

    The International Conference on Communication Systems and Network Technologies (CSNT-2011) is organized to address various issues to prosper the creation of intelligent solutions in future. The aim is to bring together worldwide leading researchers, developers, practitioners and educators interested in advancing the state of the art in computational intelligence and communication Networks for exchanging knowledge that encompasses a broad range of disciplines among various distinct communities.


2018 Eighth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC)

Instrumentation and Measurement is necessary for all the science and technology research. No measurement, no science. Measurement is the bridge between science and real world. Instrument (including sensors) is the tool of measurement and the source of information system. The technical support from computer, communication and control is necessary for the development of intelligent, virtual, automatic, systematic and networked modern instrumentation. However, computer, communication and control also depend on the development of modern instrumentation and measurement. Computer, Communication, Control, and Instrumentation&Measurement are interactive and promoted each other. The goal of this conference is to provide opportunities for researchers and engineers to contact with each other and academic exchange platform to facilitate discipline individual development and fusion of each other.

  • 2016 Sixth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC)

    Instrumentation and Measurement is necessary for all the science and technology research. No measurement, no science. Measurement is the bridge between science and real world. Instrument (including sensors) is the tool of measurement and the source of information system. The technical support from computer, communication and control is necessary for the development of intelligent, virtual, automatic, systematic and networked modern instrumentation. However, computer, communication and control also depend on the development of modern instrumentation and measurement. Computer, Communication, Control, and Instrumentation&Measurement are interactive and promoted each other. The goal of this conference is to provide opportunities for researchers and engineers to contact with each other and academic exchange platform to facilitate discipline individual development and fusion of each other.

  • 2015 Fifth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC)

    The conference contains Instrumentation and Measurement and its support techniques of computer, communication and control such as intelligent, virtual, automatic, systematic and networked modern instrumentation. The conference including five tracks: Track I: Instrument and Sensor,Modeling and simulation; Track II: Measurement, Test and Metrology; Track III: Computer;Track IV: Communication;Track V: Control.

  • 2014 Fourth International Conference on Instrumentation and Measurement, Computer, Communication and Control (IMCCC)

    This scope of this conference includes the following 5 tracks.Track I: Instrument and Sensor: Wide-band analog signal conditioning technology;Dynamic local and reconfigurable FPGA technology; High-speed ADC & DAC and testing;Real-time signal processing technology.Track II: Measurement, Test and Metrology:Measurement signal processing;Voltage, power, frequency and impedance precision measurement; Track III: Computer:High-performance processors and intelligent instrument;Parallel, array and network computing and data processing on satellite.Track IV: Communication:Advanced encoding / decoding, modulation / demodulation and multiplexing, analysis of MIMO space channel, application in IM, and digital correction.Track V: Control: Adaptive, robust, distributed and optimized control;Self-control and automatic equipment;Navigation, Guidance, Control and Instrumentation;Flight vehicle control and Drone Technology.

  • 2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control (IMCCC)

    Instrument and Sensor; Measurement, Test and Metrology;Computer;Communication;Control.

  • 2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control (IMCCC)

    Instrument and Sensor; Measurement, Test and Metrology; Computer; Communication; Control.

  • 2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control (IMCCC)

    Instrument and Sensor; Measurement, Test and Metrology;Computer;Communication;Control.


More Conferences

Periodicals related to Ciphers

Back to Top

No periodicals are currently tagged "Ciphers"


Most published Xplore authors for Ciphers

Back to Top

Xplore Articles related to Ciphers

Back to Top

Organisation of the Testery

Breaking Teleprinter Ciphers at Bletchley Park: An edition of I.J. Good, D. Michie and G. Timms: General Report on Tunny with Emphasis on Statistical Methods (1945), None

The organisation of Major Tester's Section has been described briefly in Chapter 14, and more fully in?>Report on Tunny (Major Tester's Section)?> and also in the separate report entitled?>History of the Fish Sub-Section of the German Military Section?>. Therefore, no further details are given here as they are of no great cryptographic interest and are not necessary for the understanding ...


Building a secure block ciper on small and non-binary domain

China Communications, 2014

We design a practical and provably-secure block ciper over small domain and non-binary inputs, which is also can be considered as a pseudorandom permutation on N elements. Our work is based on a relation we found between the small domain ciper and the negative hypergeometric probability (NHG) distribution. We prove that our block ciper achieves ideal security, that is, it ...


Choosing TMTO Parameters by means of Linear Optimization

IEEE Latin America Transactions, 2015

In this paper we present a linear optimization model for choosing parameters in the Time Memory Trade Off method (TMTO). The restrictions of the given model are oriented to achieve a feasible TMTO for maximum time and memory given. Experiments confirmed that the proposed scheme determines the parameters in order to get high probability to invert a one-way function. The ...


Introduction to Network Security

Host Identity Protocol (HIP): Towards the Secure Mobile Internet, None

This chapter contains sections titled:Goals of cryptographic protocolsBasics and terminologyAttack typesDefense mechanismsSecurity protocolsWeak authentication techniquesSecure DNS


Advanced fault analysis techniques on AES

2015 IEEE International Symposium on Electromagnetic Compatibility (EMC), 2015

Fault analysis research on symmetric-key cipher has been intensively discussed since differential fault analysis (DFA) was proposed in 1997. Output masking for wrong ciphertexts was believed to be the most effective countermeasure of the DFA attacks. However, fault sensitive analysis (FSA), proposed in 2010, can bypass the output-masking countermeasure. Both DFA and FSA require a strict fault injection control with ...


More Xplore Articles

Educational Resources on Ciphers

Back to Top

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Ciphers"

IEEE-USA E-Books

  • Organisation of the Testery

    The organisation of Major Tester's Section has been described briefly in Chapter 14, and more fully in?>Report on Tunny (Major Tester's Section)?> and also in the separate report entitled?>History of the Fish Sub-Section of the German Military Section?>. Therefore, no further details are given here as they are of no great cryptographic interest and are not necessary for the understanding of the present report.

  • Building a secure block ciper on small and non-binary domain

    We design a practical and provably-secure block ciper over small domain and non-binary inputs, which is also can be considered as a pseudorandom permutation on N elements. Our work is based on a relation we found between the small domain ciper and the negative hypergeometric probability (NHG) distribution. We prove that our block ciper achieves ideal security, that is, it is indistinguishable from a random permutation even if the adversary had already observed N plaintext-cipertext pairs. In particular, we initiate an efficient and sufficiently precise sampling algorithm for negative hypergeometric distribution.

  • Choosing TMTO Parameters by means of Linear Optimization

    In this paper we present a linear optimization model for choosing parameters in the Time Memory Trade Off method (TMTO). The restrictions of the given model are oriented to achieve a feasible TMTO for maximum time and memory given. Experiments confirmed that the proposed scheme determines the parameters in order to get high probability to invert a one-way function. The method can also be applied for combinations of time and memory not included in the reviewed literature.

  • Introduction to Network Security

    This chapter contains sections titled:Goals of cryptographic protocolsBasics and terminologyAttack typesDefense mechanismsSecurity protocolsWeak authentication techniquesSecure DNS

  • Advanced fault analysis techniques on AES

    Fault analysis research on symmetric-key cipher has been intensively discussed since differential fault analysis (DFA) was proposed in 1997. Output masking for wrong ciphertexts was believed to be the most effective countermeasure of the DFA attacks. However, fault sensitive analysis (FSA), proposed in 2010, can bypass the output-masking countermeasure. Both DFA and FSA require a strict fault injection control with the same plaintext, which is often difficul to realize under a circumstance where faults are randomly injected, e.g., in the case of electromagnetic (EM) fault injections. Although it requires the distribution of faulty ciphertexts, an extended fault analysis technique called NU-FVA, proposed in 2013, can avoid the hardness of the fault injection control. This article reviews the previous fault attacks and discusses their merits and demerits especially focusing on the power of the NU-FVA attack.

  • Randomness properties of stream ciphers for wireless communications

    In this paper we evaluate the randomness properties of four synchronous stream ciphers for use in wireless communications. These ciphers are: SNOW 3G, ZUC, and AES, all of which are a part of the current LTE standard, and the WG-16 stream cipher. The randomness testing is performed with the NIST SP 800-22 test suite, and its results are accordingly tabulated. In addition, we also examine the autocorrelation properties of the keystreams.

  • Security analysis and enhanced design of a dynamic block cipher

    There are a lot of security issues in block cipher algorithm. Security analysis and enhanced design of a dynamic block cipher was proposed. Firstly, the safety of ciphertext was enhanced based on confusion substitution of S-box, thus disordering the internal structure of data blocks by four steps of matrix transformation. Then, the diffusivity of cipher-text was obtained by cyclic displacement of bytes using column ambiguity function. The dynamic key was finally generated by using LFSR, which improved the stochastic characters of secret key in each of round of iteration. The safety performance of proposed algorithm was analyzed by simulation test. The results showed the proposed algorithm has a little effect on the speed of encryption and decryption while enhancing the security. Meanwhile, the proposed algorithm has highly scalability, the dimension of S-box and the number of register can be dynamically extended according to the security requirement.

  • Hash_RC6 — Variable length Hash algorithm using RC6

    In this paper, we present a hash algorithm using RC6 that can generate hash value of variable length. Hash algorithms play major part in cryptographic security as these algorithms are used to check the integrity of the received message. It is possible to generate hash algorithm using symmetric block cipher. The main idea behind this is that if the symmetric block algorithm is secure then the generated hash function will also be secure [1]. As RC6 is secure against various linear and differential attacks algorithm presented here will also be secure against these attack. The algorithm presented here can have variable number of rounds to generate hash value. It can also have variable block size.

  • The implementation of chaotic encryption scheme for images

    The conventional encryption methods are not appropriate for image cryptography as they contain large amount of data and the pixels have strong correlation. A new approach for chaotic encryption scheme for image is proposed through this paper. This image encryption algorithm is a modification of baptista's chaotic system. Analysis shows that the compression performance and encryption speed of the proposed system is much better.

  • Optimal Probabilistic Encryption for Secure Detection in Wireless Sensor Networks

    We consider the problem of secure detection in wireless sensor networks operating over insecure links. It is assumed that an eavesdropping fusion center (EFC) attempts to intercept the transmissions of the sensors and to detect the state of nature. The sensor nodes quantize their observations using a multilevel quantizer. Before transmission to the ally fusion center (AFC), the senor nodes encrypt their data using a probabilistic encryption scheme, which randomly maps the sensor's data to another quantizer output level using a stochastic cipher matrix (key). The communication between the sensors and each fusion center is assumed to be over a parallel access channel with identical and independent branches, and with each branch being a discrete memoryless channel. We employ J-divergence as the performance criterion for both the AFC and EFC. The optimal solution for the cipher matrices is obtained in order to maximize J-divergence for AFC, whereas ensuring that it is zero for the EFC. With the proposed method, as long as the EFC is not aware of the specific cipher matrix employed by each sensor, its detection performance will be very poor. The cost of this method is a small degradation in the detection performance of the AFC. The proposed scheme has no communication overhead and minimal processing requirements making it suitable for sensors with limited resources. Numerical results showing the detection performance of the AFC and EFC verify the efficacy of the proposed method.



Standards related to Ciphers

Back to Top

No standards are currently tagged "Ciphers"


Jobs related to Ciphers

Back to Top