-
2141
Hiding & Retrieval of Encrypted Data in an Image Using XOR Based on RBF and GRNN Networks and Comparison between their Performance
Published 2013-08-01“…The first one is hiding the message in the cover to produce stego-cover image. The second one is ciphering the embedded image using RBF Neural Network or GRNN. …”
Get full text
Article -
2142
Proposing packet-key based end-to-end security architecture for the post-LTE networks
Published 2019-06-01“…This paper proposes the end-to-end security scheme with packet key mechanism to perform ciphering of user traffic between two User Equipments (UEs) attached to the different Long Term Evolution (LTE) networks. …”
Get full text
Article -
2143
Integrate the hierarchical cluster elliptic curve key agreement with multiple secure data transfer modes into wireless sensor networks
Published 2022-12-01“…Hence, efficient key management schemes with lightweight ciphers are essential. Many asymmetric keys or public key mechanisms have been developed. …”
Get full text
Article -
2144
Sexual Socialization: A Seamless Approach in De-emphasizing Rape Scourge in Nigeria
Published 2021-02-01“…This scourge has unmasked its ugly face; of no value nakedness and spiteful fang on the nation in no undersized gauge, thereby consuming and reducing her women-folk to nothing but ciphers of humanity even in their own home; their dignity alienated, emotionally and psychologically dehumanized, made to struggle with societal stigmatization and above all, condemned to a lifetime melancholy trauma. …”
Get full text
Article -
2145
A Security Enhanced Encryption Scheme and Evaluation of Its Cryptographic Security
Published 2019-07-01“…This paper proposes the encryption-decryption paradigm for the security enhancement of lightweight block ciphers based on dedicated error-correction coding and a simulator of the deletion channel controlled by the secret key. …”
Get full text
Article -
2146
-
2147
Chaos Based Cryptography An Alternative to Algebraic Cryptography
Published 2008“…Introduced by Baptista in 1998, it is able to produce different ciphers for the same plaintext. It was cracked by Alvarez in 2003 via the one-time pad attack. …”
Get full text
Article -
2148
Improving the Statistical Qualities of Pseudo Random Number Generators
Published 2022-01-01“…Taking inspiration from techniques employed in symmetric ciphers, it is based on four seed-dependent substitution boxes, an evolving internal state register, and the combination of different types of operations with the aim of diffusing nonrandom patterns in the input sequence. …”
Get full text
Article -
2149
A Novel Delay Linear Coupling Logistics Map Model for Color Image Encryption
Published 2018-06-01“…It is illustrated by simulation results that the ciphered images have good pseudo randomness through our method. …”
Get full text
Article -
2150
A Countermeasure against DPA on SIMON with an Area-Efficient Structure
Published 2019-02-01“…Differential power analysis (DPA) is an effective side channel attack method, which poses a critical threat to cryptographic algorithms, especially lightweight ciphers such as SIMON. In this paper, we propose an area-efficient countermeasure against DPA on SIMON based on the power randomization. …”
Get full text
Article -
2151
New Differentially 4-Uniform Piecewise Permutations over <inline-formula><math display="inline"><semantics><msub><mi mathvariant="double-struck">F</mi><msup><mn>2</mn><mrow><mn>2</...
Published 2023-01-01“…Permutations with low differential uniformity, high nonlinearity and high algebraic degree over <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mi mathvariant="double-struck">F</mi><msup><mn>2</mn><mrow><mn>2</mn><mi>k</mi></mrow></msup></msub></semantics></math></inline-formula> are preferred substitution boxes in modern block ciphers. In this paper, we study the bijectivity and the difference uniformity of piecewise function with the help of permutation group theory. …”
Get full text
Article -
2152
Generation of Nonlinear Substitutions by Simulated Annealing Algorithm
Published 2023-04-01“…In particular, the strength of symmetric ciphers to linear cryptanalysis is directly related to the nonlinearity of substitution. …”
Get full text
Article -
2153
Lightweight AEAD and Hashing using the Sparkle Permutation Family
Published 2020-06-01“…These are combined with the Beetle mode to construct a family of authenticated ciphers, Schwaemm, with security levels ranging from 120 to 250 bits. …”
Get full text
Article -
2154
Design, FPGA-based Implementation and Performance of a Pseudo Random Number Generator of Chaotic Sequences
Published 2021-05-01“…Pseudo-Random Number Generator of Chaotic Sequences (PRNG-CS) has caught the attention in various security applications, especially for stream and block ciphering, steganography, and digital watermarking algorithms. …”
Get full text
Article -
2155
Mixture Differential Cryptanalysis: a New Approach to Distinguishers and Attacks on round-reduced AES
Published 2018-06-01“…In this paper we introduce “Mixture Differential Cryptanalysis” on round-reduced AESlike ciphers, a way to translate the (complex) “multiple-of-8” 5-round distinguisher into a simpler and more convenient one (though, on a smaller number of rounds). …”
Get full text
Article -
2156
The Image of the Land and Its Functions in Tolstoy’s Novel Resurrection
Published 2020-09-01“…The image of the land is ciphered in the description of the severity of prisoners’ life and Nekhlyudov’s attempts to help the prisoners. …”
Get full text
Article -
2157
On the price of priceless goods. Sociological Observations on and around Art Basel
Published 2017-02-01“…Today’s public discourse on art revolves around the price of these priceless goods and numbers function as ciphers for the collective representations of art and its status in late capitalist society. …”
Get full text
Article -
2158
Improved guess-and-determine and distinguishing attacks on SNOW-V
Published 2021-09-01“…These attacks do not threaten SNOW-V, but provide more in-depth details for understanding its security and give new ideas for cryptanalysis of other ciphers.…”
Get full text
Article -
2159
Identity as Liminality in Post-Colonial Fiction: Nadine Gordimer.’s The Pickup and Bessie Head.’s A Question of Power
Published 2017-03-01“…Abstract: This paper sets out to analyze the interstitial/liminal aspect of postcolonial literature as ciphered in the narratives of Nadine Gordimer and Bessie Head. …”
Get full text
Article -
2160
MDS Matrices with Lightweight Circuits
Published 2018-06-01“…MDS matrices are an important element for the design of block ciphers such as the AES. In recent years, there has been a lot of work on the construction of MDS matrices with a low implementation cost, in the context of lightweight cryptography. …”
Get full text
Article