Jundi, "An analytical approach to the design of parallel block cipher
encryption/decryption: a CPU/GPU case study," in Proceedings of the 2011 19th International Euromicro Conference on Parallel, Distributed and Network-Based Processing, pp.
Simeck Family Block Cipher
. The Simeck family block cipher
was proposed at CHES 2015 , and it succeeded the architecture of SIMON and SPECK  and therefore has similar encryption round functions with different numbers of rotation operations and bit rotation operations.
HIGHT is a lightweight block cipher
that has attracted a lot of attention because it is constructed by only ARX operations (modular addition, bitwise rotation, bitwise shift, and XOR), which exhibits high performance in terms of hardware compared to other block ciphers
And Robertas (2015), An Algorithm for Key-Dependent S-Box Generation in Block Cipher
System, INFORMATICA, Vol.
In addition the block cipher
process computes the data to avoid the complexity while processing encryption and decryption process.
Sadeghian, "MIBS: a new lightweight block cipher
," CANS, Vol.
The image encryption has been done with either stream or block cipher
. Sometimes block cipher
is not feasible due to lack of robustness and homogenous regions.
Gondal, "An efficient metho d for the construction of block cipher
with multi chaotic systems," Nonlinear Dynamics, vol.
In this paper, various security challenges in cloud environment have been analyzed and an appropriate solution for providing confidentiality and ensuring integrity of dynamically changing data has been proposed by using an efficient block cipher
, 2-Keys Symmetric Encryption technique with the linked list data structure.
randomness testing does not involve the key schedule algorithm testing which is an important part of any block cipher
The protocol uses symmetric block cipher
with block size of 64 bits to encrypt content of messages.
According to operational procedure, cryptographic techniques can be further classified as stream cipher and block cipher
. Stream ciphers operate on abit stream of arbitrary length, e.g., a single byte.
The authors monitored the impact of block length of block cipher
k on the resulting undetected error probability of cryptographic code [P.sub.UC] as well as on progress of error probability of gaining the dangerous state [P.sub.6](t).
The basic idea in suggesting a method to solve the problem in privacy protection which is referred to in Section 2 is to encrypt information by using block cipher
algorithms (e.g., AES, Blowfish, etc.), which is commonly known as a field which includes patient ID.