We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Full-round impossible differential attack on shadow block cipher

    Lightweight block ciphers are the essential encryption algorithm for devices with limited resources. Its goal is to ensure the security of data...

    Yuting Liu, Yongqiang Li, ... Mingsheng Wang in Cybersecurity
    Article Open access 07 December 2023
  2. RBFK cipher: a randomized butterfly architecture-based lightweight block cipher for IoT devices in the edge computing environment

    Internet security has become a major concern with the growing use of the Internet of Things (IoT) and edge computing technologies. Even though data...

    Sohel Rana, M. Rubaiyat Hossain Mondal, Joarder Kamruzzaman in Cybersecurity
    Article Open access 01 February 2023
  3. The differential fault analysis on block cipher FeW

    Feather weight (FeW) cipher is a lightweight block cipher proposed by Kumar et al. in 2019, which takes 64 bits plaintext as input and produces 64...

    Haiyan **ao, Lifang Wang, **yong Chang in Cybersecurity
    Article Open access 03 November 2022
  4. LightWeight energy-efficient Block Cipher based on DNA cryptography to secure data in internet of medical things devices

    The purpose of this study is to secure data in internet of medical things (IoMT) environment while saving energy to improve objects lifetime....

    Nabila Zitouni, Maamar Sedrati, Amel Behaz in International Journal of Information Technology
    Article 19 October 2023
  5. A lightweight and robust block cipher algorithm for real-time applications

    Ensuring the protection of big data during transmission or storage represents a highly significant concern for both enterprises and individual users....

    Amal Hafsa, Mohamed Gafsi, Mohsen Machhout in Signal, Image and Video Processing
    Article 26 November 2023
  6. LTLBC: a low-latency lightweight block cipher for internet of things

    The low-latency property is becoming increasingly crucial in response to the demand for data processing in the Internet of Things (IoT) environment,...

    Wei Sun, Lang Li, **antong Huang in Cluster Computing
    Article 29 April 2024
  7. On recovering block cipher secret keys in the cold boot attack setting

    This paper presents a general strategy to recover a block cipher secret key in the cold boot attack setting. More precisely, we propose a...

    Gustavo Banegas, Ricardo Villanueva-Polanco in Cryptography and Communications
    Article Open access 13 February 2023
  8. Triple byte nonlinear component of block cipher and its application in frequency domain watermarking

    In today’s world, digital data such as images, videos, and texts are easily accessible to just about anyone, posing significant security and...

    Tariq Shah, Asma Batool in Multimedia Tools and Applications
    Article 04 April 2023
  9. Robust hardware implementation of a block-cipher scheme based on chaos and biological algebraic operations

    Currently, chaos-based cryptosystems are widely used for the reason of protecting sensitive data. Various different chaos-based cryptography systems...

    Rim Amdouni, Mohamed Gafsi, ... Abdellatif Mtibaa in Multimedia Tools and Applications
    Article 18 March 2023
  10. DBST: a lightweight block cipher based on dynamic S-box

    IoT devices have been widely used with the advent of 5G. These devices contain a large amount of private data during transmission. It is primely...

    Liuyan Yan, Lang Li, Ying Guo in Frontiers of Computer Science
    Article 17 September 2022
  11. Cryptanalysis of DBST, a lightweight block cipher

    Sadegh Sadeghi, Nasour Bagheri in Frontiers of Computer Science
    Article 08 April 2024
  12. A Block Cipher Algorithm Identification Scheme Based on Hybrid Random Forest and Logistic Regression Model

    Cryptographic algorithm identification is aimed to analyze the potential feature information in ciphertext data when the ciphertext is known, which...

    Ke Yuan, Yabing Huang, ... Daoming Yu in Neural Processing Letters
    Article 20 August 2022
  13. Linear Cryptanalysis of Lightweight Block Cipher WARP

    WARP is 128-bit lightweight block cipher proposed by Banik et al. in SAC 2020, which is currently the smallest 128-bit block cipher in terms of...
    Hong Xu, Chunyu Hao, ... Wenfeng Qi in Provable and Practical Security
    Conference paper 2023
  14. SCENERY: a lightweight block cipher based on Feistel structure

    In this paper, we propose a new lightweight block cipher called SCENERY. The main purpose of SCENERY design applies to hardware and software...

    **gya Feng, Lang Li in Frontiers of Computer Science
    Article 11 November 2021
  15. Modified lightweight GIFT cipher for security enhancement in resource-constrained IoT devices

    The internet of things (IoT) ensures flexible network services to the end devices connected to it. Although security has always been a concern for...

    Nilufar Yasmin, Richa Gupta in International Journal of Information Technology
    Article 11 September 2023
  16. MILP-Aided Cryptanalysis of the FUTURE Block Cipher

    FUTURE is a recently proposed, lightweight block cipher. It has an AES-like, SP-based, 10-round encryption function, where, unlike most other...
    Conference paper 2023
  17. Differences with high probability and impossible differentials for the KB-256 cipher

    In this paper differences with probability 1 were found for 6 and 7 rounds of KB-256 block cipher. Also using Biham’s et al. shrinking technique we...

    R. Astrakhantsev, A. Chuhno, ... I. Astrakhantseva in Journal of Computer Virology and Hacking Techniques
    Article 08 July 2024
  18. Rectangle Attacks on Reduced Versions of the FBC Block Cipher

    The FBC block cipher is an award-winning algorithm of the recent Cryptographic Algorithm Design Competition in China, which has three versions:...
    Wenchang Zhou, Jiqiang Lu in Cryptography and Coding
    Conference paper 2024
  19. A reversible system based on hybrid toggle radius-4 cellular automata and its application as a block cipher

    The one-dimensional cellular automata (CA) system detailed herein uses a hybrid mechanism to attain reversibility, and this approach is adapted to...

    Everton R. Lira, Heverton B. de Macêdo, ... Gina M. B. Oliveira in Natural Computing
    Article 25 March 2023
  20. Collision-Resistant and Pseudorandom Hash Function Using Tweakable Block Cipher

    This paper presents a method to construct a keyed Merkle-Damgård hash function satisfying collision resistance and the pseudorandom function property...
    Conference paper 2023
Did you find what you were looking for? Share feedback.