Search
Search Results
-
AESPIE: Raspberry Pi AES Performance Evaluation Using Image Encryption in C and Python
Image encryption is crucial for safeguarding private and official documents online, while IoT devices and embedded systems handle large volumes of... -
Optimized Quantum Implementation of SEED
With the advancement of quantum computers, it has been demonstrated that Grover’s algorithm enables a potential reduction in the complexity of... -
Differential Analysis and Fingerprinting of ZombieLoads on Block Ciphers
Microarchitectural Data Sampling (MDS) [16, 18] enables to observe in-flight data that has recently been loaded or stored in shared short-time... -
Alternative Key Schedules for the AES
The AES block cipher is today the most important and analyzed symmetric algorithm. While all versions of the AES are known to be secure in the... -
High capacity reversible data hiding in encrypted images using multi-MSB data hiding mechanism with elliptic curve cryptography
Data-hiding technology plays an important role in fields of the image such as copyright identification and annotation. Predicators may be exploited...
-
LiARX: A Lightweight Cipher Based on the LTS Design Strategy of ARX
In recent years, technological advancements have led to the production of hardware devices that have extremely constrained resources (viz. RFID tags... -
Robust video encryption for H.264 compressed bitstream based on cross-coupled chaotic cipher
In order to realize the secure transmission of the H.264 compressed video bitstream, a detailed analysis of the structure for video bitstream is...
-
Performance and security analysis using B-128 modified blowfish algorithm
Information security is a domain having extensive applications in the twenty-first century and beyond. Encryption is a technique used to prevent data...
-
Construction of equivalent linear trails and multiple linear attack on reduced-round GIFT-64
To estimate the security of block ciphers against linear attacks, we introduce a kind of word-wise permutation which is used to construct equivalent...
-
Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing
The Meet-in-the-Middle approach is one of the most powerful cryptanalysis techniques, demonstrated by its applications in preimage attacks on the... -
Fault-tolerant and error-correcting 4-bit S-boxes for cryptography applications with multiple errors detection
In this paper, fault-tolerant and error-correcting 4-bit S-boxes for cryptography applications with multiple error detection and correction are...
-
Recent Advances in Machine Learning for Differential Cryptanalysis
Differential cryptanalysis has proven to be a powerful tool to identify weaknesses in symmetric-key cryptographic systems such as block ciphers.... -
Tight Security Bounds for Generic Stream Cipher Constructions
The design of modern stream ciphers is strongly influenced by the fact that Time-Memory-Data tradeoff (TMD-TO) attacks reduce their effective key... -
Cryptography Foundations
This chapter introduces the concept of cryptography, or mathematical codes used to protect data. It can be a tough concept. To help make this concept... -
Mathematical aspects of division property
This work surveys mathematical aspects of division property , which is a state-of-the-art technique in cryptanalysis of symmetric-key algorithms, such...
-
An analytical review of current S-box design methodologies, performance evaluation criteria, and major challenges
The expansion of worldwide networking has created new possibilities for management, development, and presentation in the form of digital data. The...
-
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure
Tweakable block cipher (TBC) is an extension of conventional block cipher. We study how to build a TBC based on generalized Feistel structure (GFS),... -
A novel colour image encryption scheme using dynamic DNA coding, chaotic maps, and SHA-2
In this paper, a novel encryption scheme that combines hyperchaotic maps schemes, SHA-2, and a pixel-shifting based on the Zaslavskii map is...
-
Grover on Chosen IV Related Key Attack Against GRAIN-128a
In this paper, we present a chosen IV related key attack on Grain-128a, that exploits Grover’s algorithm as a tool. Earlier a classical version of... -
Medical image cryptosystem using a new 3-D map implemented in a microcontroller
Medical images make up for more than 25% of global attacks on privacy. Securing them is therefore of utmost importance. Chaos based image encryption...