-
2181
Development of key-dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant
Published 2018-07-01“…For data security, block ciphers like advanced encryption standard are needed. …”
Get full text
Article -
2182
Cryptanalysis of R2AP an Ultralightweight Authentication Protocol for RFID
Published 2017-12-01“…Methods: To extract the secret ID, linear cryptanalysis is used, which is a tool mostly for attack block ciphers. Results: Our proposed desynchronization attack succeeds with the probability almost 1 and requires an adversary to initiate 1829 sessions of the protocol with the tag. …”
Get full text
Article -
2183
Locking-Enabled Security Analysis of Cryptographic Circuits
Published 2024-01-01“…We introduce LEDFA (locking-enabled differential fault analysis) and demonstrate for several ciphers and families of locking schemes that fault attacks become possible (or consistently easier) for incorrectly unlocked circuits. …”
Get full text
Article -
2184
Discovering Non-Linear Boolean Functions by Evolving Walsh Transforms with Genetic Programming
Published 2023-10-01“…Stream ciphers usually rely on highly secure Boolean functions to ensure safe communication within unsafe channels. …”
Get full text
Article -
2185
Running With a Trot: Editing a Poem in Russian and Kyrgyz by Turusbek Madilbay
Published 2011-12-01“…(I credit Latin teachers’ use of Caesar’s ciphers for my irrational belief that no overheard phrase in a foreign tongue can be as mundane as ‘I think the pickles are on the next aisle’ but instead must be, in significance, on par with an aphorism about crossing the Rubicon.)…”
Get full text
Article -
2186
Development of key-dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant
Published 2018“…For data security, block ciphers like advanced encryption standard are needed. …”
Get full text
Article -
2187
Efficient Persistent Fault Analysis with Small Number of Chosen Plaintexts
Published 2023-03-01“… In 2018, Zhang et al. introduced the Persistent Fault Analysis (PFA) for the first time, which uses statistical features of ciphertexts caused by faulty Sbox to recover the key of block ciphers. However, for most of the variants of PFA, the prior knowledge of the fault (location and value) is required, where the corresponding analysis will get more difficult under the scenario of multiple faults. …”
Get full text
Article -
2188
Efficient electro-magnetic analysis of a GPU bitsliced AES implementation
Published 2020-02-01“…Specifically, we propose efficient multi-bit and multi-thread combinational analysis techniques based on the intrinsic properties of bitsliced ciphers and the effect of multi-thread parallelism of GPUs, respectively. …”
Get full text
Article -
2189
A medical image encryption scheme based on Mobius transformation and Galois field
Published 2024-01-01“…The proposed method for ciphering an image is very effective, as proven by its comparison with several S boxes.…”
Get full text
Article -
2190
Low-Latency and Low-Randomness Second-Order Masked Cubic Functions
Published 2022-11-01“…This enables us to construct low-latency second-order secure implementations of several popular lightweight block ciphers, including Skinny, Midori, and Prince, with a very limited number of fresh masks. …”
Get full text
Article -
2191
Practical Multiple Persistent Faults Analysis
Published 2021-11-01“…To confirm the accuracy of our methods, we performed several simulations as well as experimental validations on the ARM Cortex-M4 microcontroller with electromagnetic fault injection on AES and LED, which are two well-known block ciphers to validate the types of faults and the distribution of the number of faults in practice.…”
Get full text
Article -
2192
A New S-Box Generation Algorithm Based on Multistability Behavior of a Plasma Perturbation Model
Published 2019-01-01“…As a result, and from cryptographic point of view, chaotic ciphers with applying more than one set of initial conditions provide a higher level of security than applying only one set of initial conditions. …”
Get full text
Article -
2193
Innovative Transformation of S-Box Through Chaotic Map Using a Pragmatic Approach
Published 2024-01-01“…An S-Box is an integral and critical component in the design of modern ciphers offering a means to enhance the security of data by introducing non-linearity and confusion into the encryption process. …”
Get full text
Article -
2194
Analysis of AES, SKINNY, and Others with Constraint Programming
Published 2017-03-01“…We implement the method using the open source constraint solver Choco and apply it to the block ciphers PRESENT, SKINNY, and HIGHT (ARX construction). …”
Get full text
Article -
2195
On the Construction of New Lightweight Involutory MDS Matrices in Generalized Subfield Form
Published 2023-01-01“…Maximum Distance Separable (MDS) matrices are used as the main component of diffusion layers in block ciphers. MDS matrices have the optimal diffusion properties and the maximum branch number, which is a criterion to measure diffusion rate and security against linear and differential cryptanalysis. …”
Get full text
Article -
2196
Conditional Proxy Re-Encryption-Based Key Sharing Mechanism for Clustered Federated Learning
Published 2024-02-01“…By combining the functions of the bilinear pairwise accumulator and specific conditional proxy broadcast re-ciphering, the mechanism can verify the integrity of homomorphic encryption keys stored on cloud servers. …”
Get full text
Article -
2197
Enhancing security of incoherent optical cryptosystem by a simple position-multiplexing technique and ultra-broadband illumination
Published 2018“…Reduction of the ciphertext size further increases the strength of the ciphering. Using the spatial decorrelation of the speckle pattern we have demonstrated a position multiplexed based cryptosystem, where the ciphertext is the superposition of uniquely encrypted texts from various spatial positions. …”
Get full text
Get full text
Journal Article -
2198
Compression image sharing using DCT- Wavelet transform and coding by Blackely method
Published 2017-06-01“…For making a certain high security level, each produced share is passed through stream ciphering depends on an individual encryption key belongs to the shareholder.…”
Get full text
Article -
2199
Compression image sharing using DCT- Wavelet transform and coding by Blackely method
Published 2017-06-01“…For making a certain high security level, each produced share is passed through stream ciphering depends on an individual encryption key belongs to the shareholder.…”
Get full text
Article -
2200
A study of text-theoretical approach to S-box construction with image encryption applications
Published 2023-11-01“…A substitution box (S-box) is the basic component for modern block ciphers, which helps to ensure robust security of plain data while encryption and permits its lawful decipherment. …”
Get full text
Article