Skip to search formSkip to main contentSkip to account menu

Block size (cryptography)

Known as: Block size 
In modern cryptography, symmetric key ciphers are generally divided into stream ciphers and block ciphers. Block ciphers operate on a fixed length… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Modern General Purpose Graphics Processing Units (GPGPUs) provide high degrees of parallelism in computation and memory access… 
Review
2011
Review
2011
— With the advancement of technology and easy availability of imaging tools, it’s not difficult now a days to manipulate digital… 
2009
2009
Thanks to the probabilistic message passing performed between its component decoders, a turbo decoder is able to provide strong… 
2007
2007
Encryption, which is the backbone of security protocols, is computationally intensive and consumes energy and computational… 
Highly Cited
2004
Highly Cited
2004
Duplicate Data Elimination (DDE) is our method for identifying and coalescing identical data blocks in Storage Tank, a SAN file… 
2000
2000
Based on the grey model (GM), a simple and fast methodology is developed for lossy image compression. First of all, the image is… 
1996
1996
We evaluate MUSIC, LMS, and the Goertzel algorithms for dual-tone multiple-frequency estimation. We rate their computational… 
Highly Cited
1996
Highly Cited
1996
In coming years there will be an increasing demand for realistic 3-D display of scenes using such popular approaches as stereo or… 
1990
1990
The throughput of conventional automatic-repeat-request (ARQ) protocols, such as the stop-and-wait, go-back-N, and selective… 
1988
1988
An application-specific, very-high-level CAD (computer-aided design) tool is presented for producing very-high-throughput IIT…