We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 81-100 of 1,662 results
  1. Impossible Differential Cryptanalysis of the FBC Block Cipher

    The FBC block cipher is an award-winning algorithm of the recent Cryptographic Algorithm Design Competition in China. It employs a generalised...
    Jiqiang Lu, **ao Zhang in Information Security
    Conference paper 2023
  2. The Security of Quasigroups Based Substitution Permutation Networks

    The study of symmetric structures based on quasigroups is relatively new and certain gaps can be found in the literature. In this paper, we want to...
    Conference paper 2023
  3. Performance Analyses of AES and Blowfish Algorithms by Encrypting Files, Videos, and Images

    This study attempts to secure the stored images and restrict unauthorized individuals from accessing them to effectively protect the data of the...
    Karrar Hamzah Mezher, Timur Inan in Computing, Internet of Things and Data Analytics
    Conference paper 2024
  4. Piecewise symmetric magic cube: application to text cryptography

    This article propounds a Piecewise Symmetric Magic Cube (PSMC), the properties of which have reinvigorated its application to text encryption. A...

    Narbda Rani, Vinod Mishra, Birmohan Singh in Multimedia Tools and Applications
    Article 23 November 2022
  5. Linear Cryptanalysis of FF3-1 and FEA

    Improved attacks on generic small-domain Feistel ciphers with alternating round tweaks are obtained using linear cryptanalysis. This results in...
    Conference paper 2021
  6. Review and Comparison of Lightweight Modifications of the AES Cipher for a Network of Low-Power Devices

    Abstract

    In contemporary realities, the development of a smart city and cyber–physical systems is impossible without ensuring their information...

    O. I. Berezovskaya, S. S. Chuprov, ... E. R. Sadreev in Automatic Control and Computer Sciences
    Article 01 December 2022
  7. A Survey: Analysis of Existing Hybrid Cryptographic Techniques

    Information of all kinds is widely available right now, especially thanks to the Internet. Security concerns have long drawn attention since the...
    Aman, Rajesh Kumar Aggarwal in Cyber Security and Digital Forensics
    Conference paper 2024
  8. Shrinkable Cryptographic Technique Using Involutory Function for Image Encryption

    Cryptography is the technique of hiding and transmitting confidential information via the internet. There are various traditional cryptographic...
    Mousumi Karmakar, Annu Priya, ... Madhav Verma in Advanced Network Technologies and Intelligent Computing
    Conference paper 2023
  9. Yoyo attack on 4-round Lai-Massey scheme with secret round functions

    In this study, we present the first yoyo attack to recover the secret round function of the 4-round Lai-Massey scheme with an affine orthomorphism....

    Le Dong, Danxun Zhang, ... Wenling Wu in Designs, Codes and Cryptography
    Article 03 May 2024
  10. Lightweight encryption for privacy protection of data transmission in cyber physical systems

    Cyber-physical system (CPS) devices like connected vehicles, consumer appliances, and many other smart devices are built with limited resources like...

    Devisha Tiwari, Bhaskar Mondal, ... Deepika Koundal in Cluster Computing
    Article 26 October 2022
  11. CTEA: Chaos based tiny encryption algorithm using ECDH and TinkerBell map for data security in supply chain management

    Supply chain management (SCM), an essential part of E-Commerce, is required to plan, control, and procurement raw materials, manufacturing, and...

    Dulal Kumbhakar, Subhajit Adhikari, Sunil Karforma in Multimedia Tools and Applications
    Article 31 May 2024
  12. Quantum Speed-Up for Multidimensional (Zero Correlation) Linear Distinguishers

    This paper shows how to achieve a quantum speed-up for multidimensional (zero correlation) linear distinguishers. A previous work by Kaplan et...
    Conference paper 2023
  13. WARP : Revisiting GFN for Lightweight 128-Bit Block Cipher

    In this article, we present WARP, a lightweight 128-bit block cipher with a 128-bit key. It aims at small-footprint circuit in the field of 128-bit...
    Subhadeep Banik, Zhenzhen Bao, ... Maki Shigeri in Selected Areas in Cryptography
    Conference paper 2021
  14. Cryptography

    This chapter describes the basic techniques of cryptography as a tool to ensure confidentiality of data.
    Chapter 2024
  15. A Block Cipher Algorithm Identification Scheme Based on Hybrid Random Forest and Logistic Regression Model

    Cryptographic algorithm identification is aimed to analyze the potential feature information in ciphertext data when the ciphertext is known, which...

    Ke Yuan, Yabing Huang, ... Daoming Yu in Neural Processing Letters
    Article 20 August 2022
  16. Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3

    Format-Preserving Encryption (FPE) schemes accept plaintexts from any finite set of values (such as social security numbers or birth dates) and...
    Ohad Amon, Orr Dunkelman, ... Adi Shamir in Advances in Cryptology – EUROCRYPT 2021
    Conference paper 2021
  17. A lightweight block cipher technique for IoT based E-healthcare system security

    All the real and virtual IoT devices are connected to provide intelligent and decision-making services. Each IoT based application is designed for...

    Kakali Chatterjee, Ravi Raushan Kumar Chaudhary, Ashish Singh in Multimedia Tools and Applications
    Article 25 May 2022
  18. Quantum Attacks Against Type-1 Generalized Feistel Ciphers and Applications to CAST-256

    Generalized Feistel Schemes (GFSs) are important components of symmetric ciphers, which have been extensively studied in the classical setting....
    Boyu Ni, Gembu Ito, ... Tetsu Iwata in Progress in Cryptology – INDOCRYPT 2019
    Conference paper 2019
  19. Encryption performance and security of certain wide block ciphers

    In a context of enhancing the performance of block encryption algorithms there are two well-known approaches. The first one relates to the...

    Vladimir Fomichev, Alisa Koreneva in Journal of Computer Virology and Hacking Techniques
    Article 12 March 2020
  20. Blind Side Channel Analysis Against AEAD with a Belief Propagation Approach

    This paper present two new attacks on two lightweight authenticated encryption with associated data (AEAD): Sparkle and...
    Modou Sarry, Hélène Le Bouder, ... Gaël Thomas in Smart Card Research and Advanced Applications
    Conference paper 2024
Did you find what you were looking for? Share feedback.