Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,670,165 papers from all fields of science
Search
Sign In
Create Free Account
Block size (cryptography)
Known as:
Block size
In modern cryptography, symmetric key ciphers are generally divided into stream ciphers and block ciphers. Block ciphers operate on a fixed length…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
37 relations
Advanced Encryption Standard process
BEAR and LION ciphers
Block cipher
Block cipher mode of operation
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Using Shared Memory to Accelerate MapReduce on Graphics Processing Units
Feng Ji
,
Xiaosong Ma
IEEE International Parallel and Distributed…
2011
Corpus ID: 7972058
Modern General Purpose Graphics Processing Units (GPGPUs) provide high degrees of parallelism in computation and memory access…
Expand
Review
2011
Review
2011
Copy-Move Forgery Detection in Digital Images : Progress and Challenges
S. Sushanth Kumar
,
P. Das
,
Shally
2011
Corpus ID: 17462030
— With the advancement of technology and easy availability of imaging tools, it’s not difficult now a days to manipulate digital…
Expand
2009
2009
Improving the distance properties of turbo codes using a third component code: 3D turbo codes - [transactions letters]
C. Berrou
,
A. G. Amat
,
Youssouf Ould-Cheikh-Mouhamedou
,
Y. Saouter
IEEE Transactions on Communications
2009
Corpus ID: 7833271
Thanks to the probabilistic message passing performed between its component decoders, a turbo decoder is able to provide strong…
Expand
2007
2007
Energy consumption and computational analysis of rijndael-AES
M. Razvi Doomun
,
Sunjiv Km
,
Soyjaudah
,
Devesh Bundhoo
3rd IEEE/IFIP International Conference in Central…
2007
Corpus ID: 14842658
Encryption, which is the backbone of security protocols, is computationally intensive and consumes energy and computational…
Expand
Highly Cited
2004
Highly Cited
2004
Duplicate Data Elimination in a SAN File System
Bo Hong
,
D. Plantenberg
,
D. Long
,
M. Sivan-Zimet
IEEE Conference on Mass Storage Systems and…
2004
Corpus ID: 12290109
Duplicate Data Elimination (DDE) is our method for identifying and coalescing identical data blocks in Storage Tank, a SAN file…
Expand
2000
2000
A novel image compression using grey models on a dynamic window
Yen-Tseng Hsu
,
Jerome Yeh
International Journal of Systems Science
2000
Corpus ID: 1318557
Based on the grey model (GM), a simple and fast methodology is developed for lossy image compression. First of all, the image is…
Expand
1996
1996
Performance Evaluation and Real-Time Implementation of Subspace, Adaptive, and DFT Algorithms for Multi-tone Detection
G. Arslan
,
B. Evans
,
F. A. Sakarya
,
J. Pino
1996
Corpus ID: 16271717
We evaluate MUSIC, LMS, and the Goertzel algorithms for dual-tone multiple-frequency estimation. We rate their computational…
Expand
Highly Cited
1996
Highly Cited
1996
Stereo image compression with disparity compensation using the MRF model
Woontack Woo
,
Antonio Ortega
Other Conferences
1996
Corpus ID: 7476652
In coming years there will be an increasing demand for realistic 3-D display of scenes using such popular approaches as stereo or…
Expand
1990
1990
ARQ protocols with adaptive block size perform better over a wide range of bit error rates
J. Martins
,
J. Alves
IEEE Transactions on Communications
1990
Corpus ID: 762876
The throughput of conventional automatic-repeat-request (ARQ) protocols, such as the stop-and-wait, go-back-N, and selective…
Expand
1988
1988
Application-specific CAD of VLSI second-order sections
Cheng-Wen Wu
,
P. Cappello
IEEE Transactions on Acoustics Speech and Signal…
1988
Corpus ID: 31750815
An application-specific, very-high-level CAD (computer-aided design) tool is presented for producing very-high-throughput IIT…
Expand