-
2121
Neutrosophic Model for Evaluation Healthcare Security Criteria for Powerful and Lightweight Secure Storage System in Cloud-Based E-Healthcare Services
Published 2023-10-01“…The key derivation ensures end-to-end data. ciphering to prevent unauthorized use (KDF). This work provides robust security solutions for various environments. …”
Get full text
Article -
2122
STFTP: Secure TFTP Protocol for Embedded Multi-Agent Systems Communication
Published 2013-05-01“…Communication is analyzed for authentication, data rate and transfer time versus various data encryption ciphers and files sizes. STFTP results in an expected drop in performance, which is in the range of similar encryption algorithms. …”
Get full text
Article -
2123
Conditional Linear Cryptanalysis – Cryptanalysis of DES with Less Than 242 Complexity
Published 2018-09-01“…We present several types of such conditions, including one that is especially useful for the analysis of Feistel ciphers. We exemplify the usage of such conditions for attacks by a careful application of our extension to Matsui’s attack on the full 16-round DES, which succeeds to reduce the complexity of the best attack on DES to less than 242. …”
Get full text
Article -
2124
On the Design of Chaos-Based S-Boxes
Published 2020-01-01“…Substitution boxes (S-boxes) are critical nonlinear elements to achieve cryptanalytic resistance of modern block and stream ciphers. Given their importance, a rich variety of S-box construction strategies exists. …”
Get full text
Article -
2125
Hiding Colored Digital Images in Audio and Video Files Using Neural Networks
Published 2013-08-01“…The first one is hiding the message in the cover to produce embedded cover (stego-cover). The second one is ciphering the embedded cover using GRNN Neural Network. …”
Get full text
Article -
2126
A novel medical image protection scheme using a 3-dimensional chaotic system.
Published 2014-01-01“…To address the security and efficiency problems encountered by many existing permutation-diffusion type image ciphers, the new scheme utilizes a single 3D chaotic system, Chen's chaotic system, for both permutation and diffusion. …”
Get full text
Article -
2127
Partial Encryption in Digital Image Based On Plasma Encoding Techniques
Published 2014-12-01“…In this paper a new approach is proposed for partial encryption in digital image based on dragging the longest wavelength color in digital image then input the extract color to the plasma encoding algorithm to have partial ciphered image that can be deciphered at the recipient side using the proposed retrieve algorithm. …”
Get full text
Article -
2128
Improvements of the xAAL Home Automation System
Published 2020-06-01“…It also discusses alternatives and all aspects that led us to make structuring choices: CBOR messages on an IP multicast channel, intranet communication, ciphering with Poly1305/Chacha20, structured and extensible abstract device description, and a distributed system architecture.…”
Get full text
Article -
2129
An Efficient and Secure Alert System for VANETs to Improve Crosswalks’ Security in Smart Cities
Published 2020-04-01“…NAC minimizes the usage of asymmetric ciphers, which are fundamental to assure non-repudiation but increase performance penalties and uses hash chaining for source authentication of implicit messages.…”
Get full text
Article -
2130
Boolean Masking for Arithmetic Additions at Arbitrary Order in Hardware
Published 2022-02-01“…Modular addition is an important component of many cryptographic algorithms such as ARX-ciphers and lattice-based post-quantum secure schemes. …”
Get full text
Article -
2131
Evaluation of Image Cryptography by Using Secret Session Key and SF Algorithm
Published 2023-12-01“…Second, it involves the ciphering of the secret image using the SF algorithm. …”
Get full text
Article -
2132
-
2133
Triplex: an Efficient and One-Pass Leakage-Resistant Mode of Operation
Published 2022-08-01“… This paper introduces and analyzes Triplex, a leakage-resistant mode of operation based on Tweakable Block Ciphers (TBCs) with 2n-bit tweaks. Triplex enjoys beyond-birthday ciphertext integrity in the presence of encryption and decryption leakage in a liberal model where all intermediate computations are leaked in full and only two TBC calls operating a long-term secret are protected with implementationlevel countermeasures. …”
Get full text
Article -
2134
Reversible Data Hiding Scheme Based on VQ Prediction and Adaptive Parametric Binary Tree Labeling for Encrypted Images
Published 2021-01-01“…Furthermore, the VQ index and the secret data are stream ciphered to avoid leakage of the image content and secret information. …”
Get full text
Article -
2135
Triplex: an Efficient and One-Pass Leakage-Resistant Mode of Operation
Published 2022-08-01“… This paper introduces and analyzes Triplex, a leakage-resistant mode of operation based on Tweakable Block Ciphers (TBCs) with 2n-bit tweaks. Triplex enjoys beyond-birthday ciphertext integrity in the presence of encryption and decryption leakage in a liberal model where all intermediate computations are leaked in full and only two TBC calls operating a long-term secret are protected with implementationlevel countermeasures. …”
Get full text
Article -
2136
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions
Published 2017-02-01“…We show generic attacks on unbalanced Feistel ciphers based on the meet-in-the-middle technique. …”
Get full text
Article -
2137
Feature selection methods for non-profiled side-channel attacks on ECC
Published 2019“…Indeed, side-channel attacks have been reported to break even the theoretically secure ciphers due to the exploit in the physical leakage. …”
Get full text
Get full text
Conference Paper -
2138
Hybrid encryption technique: Integrating the neural network with distortion techniques
Published 2022-01-01“…The second layer reverses the impact of the first layer by generating weights that are used to restore the original plaintext block from the ciphered one. The distortion stage imposes further confusion on the ciphertext by applying a set of distortion and substitution operations whose functionality is fully controlled by random numbers generated by a key-based random number generator. …”
Get full text
Article -
2139
Hybrid encryption technique: Integrating the neural network with distortion techniques.
Published 2022-01-01“…The second layer reverses the impact of the first layer by generating weights that are used to restore the original plaintext block from the ciphered one. The distortion stage imposes further confusion on the ciphertext by applying a set of distortion and substitution operations whose functionality is fully controlled by random numbers generated by a key-based random number generator. …”
Get full text
Article -
2140
On Generalized Solutions of Linear Congruence ax = b (mod n) for Large Modulus n
Published 2018-01-01“…In cryptography, the concept of linear congruence is used to directly underpin public key cryptosystems during the process of ciphering and deciphering codes. Thus, linear congruence plays a very important role in cryptography. …”
Get full text
Article