Showing 2,181 - 2,200 results of 2,263 for search '"cipher"', query time: 0.15s Refine Results
  1. 2181

    Development of key-dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant by Praveen Agarwal, Amandeep Singh, Adem Kilicman

    Published 2018-07-01
    “…For data security, block ciphers like advanced encryption standard are needed. …”
    Get full text
    Article
  2. 2182

    Cryptanalysis of R2AP an Ultralightweight Authentication Protocol for RFID by M. Safkhani

    Published 2017-12-01
    “…Methods: To extract the secret ID, linear cryptanalysis is used, which is a tool mostly for attack block ciphers. Results: Our proposed desynchronization attack succeeds with the probability almost 1 and requires an adversary to initiate 1829 sessions of the protocol with the tag. …”
    Get full text
    Article
  3. 2183

    Locking-Enabled Security Analysis of Cryptographic Circuits by Devanshi Upadhyaya, Maël Gay, Ilia Polian

    Published 2024-01-01
    “…We introduce LEDFA (locking-enabled differential fault analysis) and demonstrate for several ciphers and families of locking schemes that fault attacks become possible (or consistently easier) for incorrectly unlocked circuits. …”
    Get full text
    Article
  4. 2184

    Discovering Non-Linear Boolean Functions by Evolving Walsh Transforms with Genetic Programming by Luigi Rovito, Andrea De Lorenzo, Luca Manzoni

    Published 2023-10-01
    “…Stream ciphers usually rely on highly secure Boolean functions to ensure safe communication within unsafe channels. …”
    Get full text
    Article
  5. 2185

    Running With a Trot: Editing a Poem in Russian and Kyrgyz by Turusbek Madilbay by Joyce Ellen Turner

    Published 2011-12-01
    “…(I credit Latin teachers’ use of Caesar’s ciphers for my irrational belief that no overheard phrase in a foreign tongue can be as mundane as ‘I think the pickles are on the next aisle’ but instead must be, in significance, on par with an aphorism about crossing the Rubicon.)…”
    Get full text
    Article
  6. 2186

    Development of key-dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant by Agarwal, Praveen, Singh, Amandeep, Kilicman, Adem

    Published 2018
    “…For data security, block ciphers like advanced encryption standard are needed. …”
    Get full text
    Article
  7. 2187

    Efficient Persistent Fault Analysis with Small Number of Chosen Plaintexts by Fan Zhang, Run Huang, Tianxiang Feng, Xue Gong, Yulong Tao, Kui Ren, Xinjie Zhao, Shize Guo

    Published 2023-03-01
    “… In 2018, Zhang et al. introduced the Persistent Fault Analysis (PFA) for the first time, which uses statistical features of ciphertexts caused by faulty Sbox to recover the key of block ciphers. However, for most of the variants of PFA, the prior knowledge of the fault (location and value) is required, where the corresponding analysis will get more difficult under the scenario of multiple faults. …”
    Get full text
    Article
  8. 2188

    Efficient electro-magnetic analysis of a GPU bitsliced AES implementation by Yiwen Gao, Yongbin Zhou, Wei Cheng

    Published 2020-02-01
    “…Specifically, we propose efficient multi-bit and multi-thread combinational analysis techniques based on the intrinsic properties of bitsliced ciphers and the effect of multi-thread parallelism of GPUs, respectively. …”
    Get full text
    Article
  9. 2189

    A medical image encryption scheme based on Mobius transformation and Galois field by Javed Ali, Muhammad Kamran Jamil, Amal S. Alali, Rashad Ali, Gulraiz

    Published 2024-01-01
    “…The proposed method for ciphering an image is very effective, as proven by its comparison with several S boxes.…”
    Get full text
    Article
  10. 2190

    Low-Latency and Low-Randomness Second-Order Masked Cubic Functions by Aein Rezaei Shahmirzadi, Siemen Dhooghe, Amir Moradi

    Published 2022-11-01
    “…This enables us to construct low-latency second-order secure implementations of several popular lightweight block ciphers, including Skinny, Midori, and Prince, with a very limited number of fresh masks. …”
    Get full text
    Article
  11. 2191

    Practical Multiple Persistent Faults Analysis by Hadi Soleimany, Nasour Bagheri, Hosein Hadipour, Prasanna Ravi, Shivam Bhasin, Sara Mansouri

    Published 2021-11-01
    “…To confirm the accuracy of our methods, we performed several simulations as well as experimental validations on the ARM Cortex-M4 microcontroller with electromagnetic fault injection on AES and LED, which are two well-known block ciphers to validate the types of faults and the distribution of the number of faults in practice.…”
    Get full text
    Article
  12. 2192

    A New S-Box Generation Algorithm Based on Multistability Behavior of a Plasma Perturbation Model by Alaa Kadhim Farhan, Rasha S. Ali, Hayder Natiq, Nadia M. G. Al-Saidi

    Published 2019-01-01
    “…As a result, and from cryptographic point of view, chaotic ciphers with applying more than one set of initial conditions provide a higher level of security than applying only one set of initial conditions. …”
    Get full text
    Article
  13. 2193

    Innovative Transformation of S-Box Through Chaotic Map Using a Pragmatic Approach by Awais Salman Qazi, Amjad Hussain Zahid, Abdullah Baz, Farrukh Arslan, Mubashir Ali, Jehad Ali

    Published 2024-01-01
    “…An S-Box is an integral and critical component in the design of modern ciphers offering a means to enhance the security of data by introducing non-linearity and confusion into the encryption process. …”
    Get full text
    Article
  14. 2194

    Analysis of AES, SKINNY, and Others with Constraint Programming by Siwei Sun, David Gerault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu

    Published 2017-03-01
    “…We implement the method using the open source constraint solver Choco and apply it to the block ciphers PRESENT, SKINNY, and HIGHT (ARX construction). …”
    Get full text
    Article
  15. 2195

    On the Construction of New Lightweight Involutory MDS Matrices in Generalized Subfield Form by Meltem Kurt Pehlivanoglu, Fatma Buyuksaracoglu Sakalli, Sedat Akleylek, Muharrem Tolga Sakalli

    Published 2023-01-01
    “…Maximum Distance Separable (MDS) matrices are used as the main component of diffusion layers in block ciphers. MDS matrices have the optimal diffusion properties and the maximum branch number, which is a criterion to measure diffusion rate and security against linear and differential cryptanalysis. …”
    Get full text
    Article
  16. 2196

    Conditional Proxy Re-Encryption-Based Key Sharing Mechanism for Clustered Federated Learning by Yongjing Zhang, Zhouyang Zhang, Shan Ji, Shenqing Wang, Shitao Huang

    Published 2024-02-01
    “…By combining the functions of the bilinear pairwise accumulator and specific conditional proxy broadcast re-ciphering, the mechanism can verify the integrity of homomorphic encryption keys stored on cloud servers. …”
    Get full text
    Article
  17. 2197

    Enhancing security of incoherent optical cryptosystem by a simple position-multiplexing technique and ultra-broadband illumination by Sahoo, Sujit Kumar, Tang, Dongliang, Dang, Cuong

    Published 2018
    “…Reduction of the ciphertext size further increases the strength of the ciphering. Using the spatial decorrelation of the speckle pattern we have demonstrated a position multiplexed based cryptosystem, where the ciphertext is the superposition of uniquely encrypted texts from various spatial positions. …”
    Get full text
    Get full text
    Journal Article
  18. 2198

    Compression image sharing using DCT- Wavelet transform and coding by Blackely method by Ali H. Ahmed, Loay E. George

    Published 2017-06-01
    “…For making a certain high security level, each produced share is passed through stream ciphering depends on an individual encryption key belongs to the shareholder.…”
    Get full text
    Article
  19. 2199

    Compression image sharing using DCT- Wavelet transform and coding by Blackely method by Ali Ahmed, Loay George

    Published 2017-06-01
    “…For making a certain high security level, each produced share is passed through stream ciphering depends on an individual encryption key belongs to the shareholder.…”
    Get full text
    Article
  20. 2200

    A study of text-theoretical approach to S-box construction with image encryption applications by Abid Mahboob, Muhammad Nadeem, Muhammad Waheed Rasheed

    Published 2023-11-01
    “…A substitution box (S-box) is the basic component for modern block ciphers, which helps to ensure robust security of plain data while encryption and permits its lawful decipherment. …”
    Get full text
    Article