Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,161,755 papers from all fields of science
Search
Sign In
Create Free Account
Block cipher mode of operation
Known as:
Encryption mode
, CTR mode
, Mo
Expand
In cryptography, a mode of operation is an algorithm that uses a block cipher to provide an information service such as confidentiality or…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Authenticated encryption
Authentication
Bit slip
Block (data storage)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Block Cipher Modes of Operation
Cipher Block
,
C. Cbc
,
Cipher FeedBack
2015
Corpus ID: 62791218
In fact, for a given key technically we can create a codebook of ciphertexts for all possible plaintext blocks. Encryption would…
Expand
2013
2013
Building a block cipher mode of operation with feedback keys
Yi-Li Huang
,
Fang-Yie Leu
,
+4 authors
Chao-Tung Yang
IEEE International Symposium on Industrial…
2013
Corpus ID: 27439777
In this paper, we propose two block cipher modes of operation (BCMO for short), named the Key Stream Protection Chain mode (KSPC…
Expand
2010
2010
A Resourceful Combined Block Cipher Mode of Operation for Packetised Network Communication
A. A. Adekunle
,
S. Woodhead
Fourth International Conference on Next…
2010
Corpus ID: 206497372
In this paper a combined block cipher mode of operation is presented that provides an efficient authenticated encryption with…
Expand
2009
2009
Comparing Block Cipher Modes of Operation on MICAz Sensor Nodes
Gernot R. Bauer
,
Philipp Potisk
,
S. Tillich
17th Euromicro International Conference on…
2009
Corpus ID: 18522405
Wireless sensor networks are a key technology for "ubiquitous computing" applications. The challenges of securing such networks…
Expand
2008
2008
Energy-Security Adaptation Scheme of Block Cipher Mode of Operations
Amit K. Beeputh
,
M. R. Doomun
,
Padaruth Dookee
International Symposium on Symbolic Computation…
2008
Corpus ID: 40894233
With rapid growth in wireless network technologies, there is high need for secure communication in such as highly heterogeneous…
Expand
2006
2006
The State()-of-The()-Art of Research on Block Cipher Mode of Operation
Wu Wen
2006
Corpus ID: 63814108
A mode of operation,or mode, for short,is an algorithm that features the use of a symmetric key block cipher algorithm to provide…
Expand
2000
2000
Report on the Symmetric Key Block Cipher Modes of Operation Workshop | NIST
M. Dworkin
2000
Corpus ID: 67235942
Elaine Barker extended a welcome to the workshop attendees and served as the workshop moderator. Elaine stated that the purpose…
Expand
Highly Cited
1994
Highly Cited
1994
A fuzzy controller improving a linear model following controller for motor drives
Y. Kung
,
C. Liaw
IEEE transactions on fuzzy systems
1994
Corpus ID: 28880356
Since the dynamic response trajectory of a traditional fuzzy controller can not be quantitatively controlled, a fuzzy model…
Expand
Highly Cited
1993
Highly Cited
1993
Computation of floating mode delay in combinational circuits: theory and algorithms
S. Devadas
,
K. Keutzer
,
S. Malik
IEEE Trans. Comput. Aided Des. Integr. Circuits…
1993
Corpus ID: 1983433
Addresses the problem of accurately computing the delay of a combinational logic circuit in the floating mode of operation. (In…
Expand
Highly Cited
1985
Highly Cited
1985
Pole assignment by multirate sampled-data output feedback
M. Araki
,
T. Hagiwara
IEEE Conference on Decision and Control
1985
Corpus ID: 29315471
Multirate sampled-data control of a linear time-invariant continuous-time plant is considered. It is shown that, if the plant is…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE