We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 1,728 results
  1. AESPIE: Raspberry Pi AES Performance Evaluation Using Image Encryption in C and Python

    Image encryption is crucial for safeguarding private and official documents online, while IoT devices and embedded systems handle large volumes of...
    William Riddle, G. Quan, ... Mohamed El-Hadedy in Applications of Remote Sensing and GIS Based on an Innovative Vision
    Conference paper 2023
  2. Optimized Quantum Implementation of SEED

    With the advancement of quantum computers, it has been demonstrated that Grover’s algorithm enables a potential reduction in the complexity of...
    Yu** Oh, Kyungbae Jang, ... Hwajeong Seo in Information Security and Cryptology – ICISC 2023
    Conference paper 2024
  3. Differential Analysis and Fingerprinting of ZombieLoads on Block Ciphers

    Microarchitectural Data Sampling (MDS) [16, 18] enables to observe in-flight data that has recently been loaded or stored in shared short-time...
    Till Schlüter, Kerstin Lemke-Rust in Smart Card Research and Advanced Applications
    Conference paper 2021
  4. Alternative Key Schedules for the AES

    The AES block cipher is today the most important and analyzed symmetric algorithm. While all versions of the AES are known to be secure in the...
    Christina Boura, Patrick Derbez, Margot Funk in Applied Cryptography and Network Security
    Conference paper 2024
  5. High capacity reversible data hiding in encrypted images using multi-MSB data hiding mechanism with elliptic curve cryptography

    Data-hiding technology plays an important role in fields of the image such as copyright identification and annotation. Predicators may be exploited...

    Priyanka V. Deshmukh, Avinash S. Kapse, ... Arvind S. Kapse in Multimedia Tools and Applications
    Article 16 February 2023
  6. LiARX: A Lightweight Cipher Based on the LTS Design Strategy of ARX

    In recent years, technological advancements have led to the production of hardware devices that have extremely constrained resources (viz. RFID tags...
    Saurabh Mishra, Debanjan Sadhya in Information Systems Security
    Conference paper 2020
  7. Robust video encryption for H.264 compressed bitstream based on cross-coupled chaotic cipher

    In order to realize the secure transmission of the H.264 compressed video bitstream, a detailed analysis of the structure for video bitstream is...

    Hui Xu, **aojun Tong, ... **g Ma in Multimedia Systems
    Article 07 February 2020
  8. Performance and security analysis using B-128 modified blowfish algorithm

    Information security is a domain having extensive applications in the twenty-first century and beyond. Encryption is a technique used to prevent data...

    Sunil Kumar, Dilip Kumar, Naini Singh in Multimedia Tools and Applications
    Article 13 March 2023
  9. Construction of equivalent linear trails and multiple linear attack on reduced-round GIFT-64

    To estimate the security of block ciphers against linear attacks, we introduce a kind of word-wise permutation which is used to construct equivalent...

    Yaxin Cui, Hong Xu, ... Wenfeng Qi in Journal of Cryptographic Engineering
    Article 06 September 2022
  10. Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing

    The Meet-in-the-Middle approach is one of the most powerful cryptanalysis techniques, demonstrated by its applications in preimage attacks on the...
    Zhenzhen Bao, Jian Guo, ... Yi Tu in Advances in Cryptology – CRYPTO 2022
    Conference paper 2022
  11. Fault-tolerant and error-correcting 4-bit S-boxes for cryptography applications with multiple errors detection

    In this paper, fault-tolerant and error-correcting 4-bit S-boxes for cryptography applications with multiple error detection and correction are...

    Bahram Rashidi in The Journal of Supercomputing
    Article 18 July 2023
  12. Recent Advances in Machine Learning for Differential Cryptanalysis

    Differential cryptanalysis has proven to be a powerful tool to identify weaknesses in symmetric-key cryptographic systems such as block ciphers....
    Isabella Martínez, Valentina López, ... Juan F. Pérez in Advances in Computing
    Conference paper 2024
  13. Tight Security Bounds for Generic Stream Cipher Constructions

    The design of modern stream ciphers is strongly influenced by the fact that Time-Memory-Data tradeoff (TMD-TO) attacks reduce their effective key...
    Matthias Hamann, Matthias Krause, Alexander Moch in Selected Areas in Cryptography – SAC 2019
    Conference paper 2020
  14. Cryptography Foundations

    This chapter introduces the concept of cryptography, or mathematical codes used to protect data. It can be a tough concept. To help make this concept...
    Seth James Nielson in Discovering Cybersecurity
    Chapter 2023
  15. Mathematical aspects of division property

    This work surveys mathematical aspects of division property , which is a state-of-the-art technique in cryptanalysis of symmetric-key algorithms, such...

    Phil Hebborn, Gregor Leander, Aleksei Udovenko in Cryptography and Communications
    Article 02 March 2023
  16. An analytical review of current S-box design methodologies, performance evaluation criteria, and major challenges

    The expansion of worldwide networking has created new possibilities for management, development, and presentation in the form of digital data. The...

    Adil Waheed, Fazli Subhan, ... Sohaib Ahmad in Multimedia Tools and Applications
    Article 04 March 2023
  17. Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure

    Tweakable block cipher (TBC) is an extension of conventional block cipher. We study how to build a TBC based on generalized Feistel structure (GFS),...
    Kosei Sakamoto, Kazuhiko Minematsu, ... Takanori Isobe in Advances in Information and Computer Security
    Conference paper 2019
  18. A novel colour image encryption scheme using dynamic DNA coding, chaotic maps, and SHA-2

    In this paper, a novel encryption scheme that combines hyperchaotic maps schemes, SHA-2, and a pixel-shifting based on the Zaslavskii map is...

    L. Shane John Paul, Carlton Gracias, ... Amirtharajan Rengarajan in Multimedia Tools and Applications
    Article 22 April 2022
  19. Grover on Chosen IV Related Key Attack Against GRAIN-128a

    In this paper, we present a chosen IV related key attack on Grain-128a, that exploits Grover’s algorithm as a tool. Earlier a classical version of...
    Arpita Maitra, Asmita Samanta, ... Sabyasachi Dey in Progress in Cryptology – INDOCRYPT 2023
    Conference paper 2024
  20. Medical image cryptosystem using a new 3-D map implemented in a microcontroller

    Medical images make up for more than 25% of global attacks on privacy. Securing them is therefore of utmost importance. Chaos based image encryption...

    Gideon Pagnol Ayemtsa Kuete, Lee Mariel Heucheun Yepdia, ... Justin Roger Mboupda Pone in Multimedia Tools and Applications
    Article 21 February 2024
Did you find what you were looking for? Share feedback.