-
2201
Distributed Key Management to Secure IoT Wireless Sensor Networks in Smart-Agro
Published 2020-04-01“…In such scenario, symmetric-key ciphers are preferred for key management in WSN; key distribution is therefore an issue. …”
Get full text
Article -
2202
A New Automatic Tool Searching for Impossible Differential of NIST Candidate <i>ACE</i>
Published 2020-09-01“…Based on the method of characteristic matrix, we build an automatic searching algorithm that can be used to search for structural impossible differentials and give the optimal permutation for <i>ACE</i> permutation and other SPN ciphers. We prove that there is no impossible differential of <i>ACE</i> permutation longer than 9 steps and construct two 8-step impossible differentials. …”
Get full text
Article -
2203
Big Data Provenance Using Blockchain for Qualitative Analytics via Machine Learning
Published 2023-05-01“…Unauthorized access to the data is very challenging due to the ciphered and decentralized data preservation in the blockchain network. …”
Get full text
Article -
2204
Quantum-Resistant Cryptography for the Internet of Things Based on Location-Based Lattices
Published 2021-01-01“…Quantum computing, another emerging technological paradigm, promises novel compute opportunities but is also able to compromise cybersecurity ciphers. Therefore, improved methods to mitigate such security threats are needed. …”
Get full text
Article -
2205
Converting of Boolean Expression to Linear Equations, Inequalities and QUBO Penalties for Cryptanalysis
Published 2022-01-01“…The advantage of the proposed approach is that both methods reduce important cryptanalysis problems, such as the preimaging of hash functions or breaking symmetric ciphers as the MILP problems, which are solved by the generic MILP solvers. …”
Get full text
Article -
2206
A Novel Message-Preserving Scheme with Format-Preserving Encryption for Connected Cars in Multi-Access Edge Computing
Published 2019-09-01“…Therefore, in this paper, we propose a method for encrypting the data frame, including real data in the CAN message structure, using format-preserving encryption (FPE), which ensures that the plaintext and ciphertext have the same format and length. In this way, block ciphers such as AES-128 must be divided into two or three blocks, but FPE can be processed simultaneously by encrypting them according to the CAN message format, thus providing better security against denial-of-service attacks. …”
Get full text
Article -
2207
Proving Resistance Against Infinitely Long Subspace Trails: How to Choose the Linear Layer
Published 2021-06-01“…Designing cryptographic permutations and block ciphers using a substitutionpermutation network (SPN) approach where the nonlinear part does not cover the entire state has recently gained attention due to favorable implementation characteristics in various scenarios. …”
Get full text
Article -
2208
Morphometric analysis of "pancitokeratin-positive" neoplastic lesions of the lymph nodes of the neck
Published 2017-12-01“…Squamous cell carcinomas of the head and neck have an accessible visualization and rare phenotypes that produce metastatic cells before the increase in the primary focus (only 2 of 41), therefore should not fall under the ciphers of cancers of unknown primary localization. …”
Get full text
Article -
2209
O fracasso da metafísica Uma exegese de algumas passagens da Psicologia das Visões de Mundo de Karl Jaspers
Published 2016-12-01“…And in his last lecture, Jaspers takes up the theme again, discussing the ideas of “ciphers”, “transcendence”, “being in failure”. However, already in 1919, in his book Psychology of World Views, the concept of metaphysics appears in crucial moments. …”
Get full text
Article -
2210
Timestamp Estimation in P802.15.4z Amendment
Published 2020-09-01“…This paper analyses the key parts of PHY which have a great contribution in timestamp estimation precision, particularly: UWB pulse, channel sounding and timestamp estimation using ciphered sequence and frequency selective fading. Unlike EiR, where the UWB pulse is defined in the time domain, in this article, the UWB pulse is synthesized from the power spectral density mask, and it is shown that the use of the entire allocated spectrum results in a decrease in risetime, an increase in pulse amplitude, and an attenuation of lateral lobes. …”
Get full text
Article -
2211
Letters of Friedrich Christian Weber to John Robeson from Russia, 1718-1719
Published 2022-05-01“…The article examines various aspects of Weber's diplomatic activities, including the methods he used to collect information in Russia and send it to England, such as bribing Russian officials, resorting to secret agents, ciphers, sending dispatches “under the cover, and others. …”
Get full text
Article -
2212
The Student Library of the Kyiv Theological Seminary (History of Formation, Systematic Composition and Current State)
Published 2022-01-01“…A new source base of research has been involved, in particular, information on the catalog of books, which reveals the composition of the student library fund, has been put into scientific circulation.The attribution of books from this book collection was carried out, the historical location of books was reproduced in accordance with the ciphers preserved from the time of the library’s existence, and the system of book placement was analyzed. …”
Get full text
Article -
2213
JSE 31:4 Editorial
Published 2017-12-01“…Roper argues that Sixteenth-Century techniques of using codes and ciphers were both common and quite well-developed, and that these permitted concealing secret messages within apparently innocent passages of prose or poetry. …”
Get full text
Article -
2214
Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home
Published 2022-03-01“…Since the emergence of IoT, lightweight block ciphers have been a better option for intelligent and sensor-based applications. …”
Get full text
Article -
2215
Art for the Apocalypse: Sculpture by Frink in Losey’s The Damned
Published 2014-07-01“…Freya Neilson (Viveca Lindfors) was conceived expressly to employ the work of sculptor Elisabeth Frink (1930-1993), whose scarred, distressed figural works of the period included anthropomorphic birds, winged men, fallen men, horse heads and other morbid ciphers of existential dread. In the film these works of plaster and bronze embody the age of anxiety even as they represent art as a redemptive alternative to the cold-bloodedness of both lowbrow Teddy Boy (Oliver Reed) and highbrow Government scientist (Alexander Knox). …”
Get full text
Article -
2216
STUDY OF HIGH-SPEED REALIZATION TECHNICS FOR ELEMENTS OF SYMMETRIC ENCRYPTION ALGORITHMS DURING CALCULATIONS ON GRAPHICS PROCESSOR
Published 2018-07-01“…To achieve this goal, we considered LSX and ARX structures of block algorithms on the example of the following ciphers: AES, «Kuznyechik», LEA, Rectangle, Simon and Speck. …”
Get full text
Article -
2217
Exploring Integrity of AEADs with Faults: Definitions and Constructions
Published 2022-12-01“…For symmetric-key cryptography, a significant amount of exploration has taken place in this regard for primitives such as block ciphers. Concerning symmetric-key operating modes, such as Authenticated Encryption with Associated Data (AEAD), the stateof-the-art mainly addresses the passive Side-Channel Attacks (SCA) in the form of leakage resilient cryptography. …”
Get full text
Article -
2218
Exploring Differential-Based Distinguishers and Forgeries for ASCON
Published 2021-09-01“…While MILP and SAT solvers are among the most popular tools to model ciphers and perform cryptanalysis, other methods with different performance profiles are appearing. …”
Get full text
Article -
2219
An Efficient Generation and Security Analysis of Substitution Box Using Fingerprint Patterns
Published 2020-01-01“…The keystone of the modern block and stream ciphers is the use of a substitution box (s-box) that obscures correlation between plaintext and ciphertext. …”
Get full text
Article -
2220
Applications of design theory for the constructions of MDS matrices for lightweight cryptography
Published 2017-06-01“…Maximum distance separable (MDS) matrices have applications not only in coding theory but are also of great importance in the design of block ciphers and hash functions. It is nontrivial to find MDS matrices which could be used in lightweight cryptography. …”
Get full text
Article