-
1961
The Сontrol of the Chaotic Regimes in Encryption Algorithm Based on Dynamic Chaos
Published 2019-06-01“…The comparative analysis of the parameters for the input and output sets used in encryption algorithms based on a dynamic chaos with standard AES, DES ciphers was performed. It was shown that the parameters characterizing the output sets for the encryption algorithm based on dynamic chaos are not bad relative to those the standard ciphers.…”
Get full text
Article -
1962
A New Dynamic Substitution Box for Data Security Using an Innovative Chaotic Map
Published 2022-01-01“…For this purpose, different ciphers using various techniques are being developed. …”
Get full text
Article -
1963
Cloud-edge data encryption in the internet of vehicles using Zeckendorf representation
Published 2023-03-01“…Stream ciphering provides the highest levels of security, making it the ideal choice for securing data transmission in the IoV. …”
Get full text
Article -
1964
Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks?
Published 2019-09-01“…Cube attacks are an important type of key recovery attacks against stream ciphers. In particular, they are shown to be powerful against Trivium-like ciphers. …”
Get full text
Article -
1965
AAβ public key cryptosystem - a comparative analysis against RSA and ECC
Published 2012“…We provide a benchmark by practically implementing and comparing three ciphers - AAβ, RSA and ECC. This paper provides the algorithms to implement these ciphers as well as highlights the operating time and performance for varying key sizes of 128/1024/3072, 160/2048/6144 and 192/4096/12288 bits. …”
Get full text
Conference or Workshop Item -
1966
Symmetric Key Encryption Based on Rotation-Translation Equation
Published 2020-01-01“…Most symmetric key encryption algorithms use either block ciphers or stream ciphers. Our goal in this work is to improve an existing encryption algorithm by using a faster convergent iterative method, providing secure convergence of the corresponding numerical scheme, and improved security by a using rotation−translation formula.…”
Get full text
Article -
1967
On comparing side-channel properties of AES and ChaCha20 on microcontrollers
Published 2019“…In this paper, we consider two ciphers used in the automotive industry - AES and ChaCha20 and we evaluate their resistance against side-channel attacks. …”
Get full text
Get full text
Conference Paper -
1968
La mise en texte mathématique
Published 2004-04-01“…Then, he proposes a semiotic analysis of one of the Latin texts’ transcription thanks to which the arithmetic based on Arabic ciphers was introduced in the West. The comparison of the results with those of the same analysis applied to the French translation of this text that has just been issued allows him to compare the evolution of the form of mathematical texts to the evolution of the semiotical characteristics of ciphers. …”
Get full text
Article -
1969
Investigation of Chaotic Image Encryption in Spatial and FrFT Domains for Cybersecurity Applications
Published 2020-01-01“…This paper presents an investigation of the encryption efficiency of the chaotic-based image block ciphering in the spatial and Fractional Fourier Transform (FrFT) domains. …”
Get full text
Article -
1970
On Pseudorandomness and Deep Learning: A Case Study
Published 2023-03-01“…It is also a key requirement in the calls for proposals of new primitives, as in the case of block ciphers. Therefore, the assessment of the property is an important issue to deal with. …”
Get full text
Article -
1971
Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols
Published 2020-09-01“…This discussion highlights a crucial point—the considerations for designing arithmetization-oriented ciphers are oftentimes different from the considerations arising in the design of software- and hardware-oriented ciphers. …”
Get full text
Article -
1972
On group rings and some of their applications to combinatorics and symmetric cryptography
Published 2015-12-01“…We give a survey of recent applications of group rings to combinatorics and to cryptography, including their use in the di erential cryptanalysis of block ciphers.…”
Get full text
Article -
1973
Chaos-Based Image Encryption: Review, Application, and Challenges
Published 2023-06-01“…This paper closely examines the development process of chaos-based image-encryption algorithms from various angles, including symmetric and asymmetric algorithms, block ciphers and stream ciphers, and integration with other technologies. …”
Get full text
Article -
1974
Evaluation of Cryptographic Algorithms over an all Programmable SoC (AP SoC) Device
Published 2017-04-01“…This paper runs an evaluation of cryptographic algorithms (block ciphers and public key ciphers) in an All Programmable SoC (AP SoC) device, comparing time, power consumption on two different test beds a PC and the AP SoC, with a taxonomy work done comparing all the previous papers about cryptographic algorithms implemented on FPGAs. …”
Get full text
Article -
1975
Evolving Nonlinear S-Boxes With Improved Theoretical Resilience to Power Attacks
Published 2020-01-01“…Substitution boxes are the main nonlinear component of block ciphers. The security of these ciphers against linear, differential, or side-channel attacks is dependent on the design of such component and their intrinsic properties. …”
Get full text
Article -
1976
An energy saving scheme for key management protocol in IEEE802.16e
Published 2013“…In WiMAX service, the Base Station (BS) sends security keys to MSs using key management scheme, and MSs need to perform ciphering operations to get access to the security keys for further processing. …”
Get full text
Conference or Workshop Item -
1977
Computational Complexity of Some Problems on Generalized Cellular Automations
Published 2012-03-01“…The results of this work are important for supporting the security of the ciphers based on the cellular automations.…”
Get full text
Article -
1978
Algebraic Attacks on RAIN and AIM Using Equivalent Representations
Published 2023-12-01“…Many such existing primitives adopt quite different design strategies from conventional block ciphers. Notable features include that many of these ciphers are defined over a large finite field, and that a power map is commonly used to construct the nonlinear component due to its efficiency in these applications as well as its strong resistance against the differential and linear cryptanalysis. …”
Get full text
Article -
1979
A secure key dependent dynamic substitution method for symmetric cryptosystems
Published 2021-07-01“…The biggest challenge for symmetric cryptosystems is to replace their static substitution with dynamic substitution, because static substitution S-boxes make the symmetric block ciphers more vulnerable to attacks. Previous well-known dynamic key-dependent S-boxes are lacking in dynamicity and do not provide optimal security for symmetric block ciphers. …”
Get full text
Article -
1980
MILP-Based Differential Cryptanalysis on Round-Reduced Midori64
Published 2020-01-01“…</italic> at Asiacrypt 2014 to search for differential characteristics of block ciphers. Based on this model, it is easy to assess block ciphers against differential attack. …”
Get full text
Article