We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. SCARE and power attack on AES-like block ciphers with secret S-box

    Despite Kerckhoff’s principle, there are secret ciphers with unknown components for diplomatic or military usages. The side-channel analysis of...

    **n Liu, An Wang, ... Zongyue Wang in Frontiers of Computer Science
    Article 16 November 2021
  2. Detection of non-trivial preservable quotient spaces in S-Box(es)

    Substitution Box (S-Box) is employed in block ciphers to ensure non-linearity. An n -bit bijective S-Box is a member of the Symmetric Group ...

    Shah Fahd, Mehreen Afzal, ... Yawar Abbas in Neural Computing and Applications
    Article 03 June 2023
  3. A chaos-based novel approach to video encryption using dynamic S-box

    Video Encryption is the process of converting the video into an unrecognizable form to protect it from unauthorized access. This paper proposes a...

    Deepti Dhingra, Mohit Dua in Multimedia Tools and Applications
    Article 09 May 2023
  4. A new steganographic algorithm based on coupled chaotic maps and a new chaotic S-box

    The art of concealing information by embedding it in a seemingly “innocent” message is called steganography. An appropriate system for steganography...

    Nafiseh Hematpour, Sodeif Ahadpour, ... Reza Hoseini Sani in Multimedia Tools and Applications
    Article 02 May 2022
  5. Cryptanalysis of DRPE using complex S-Box based on linear canonical transform

    During recent decades, double random phase encoding grasped more attention for researchers. To achieve nonlinearity, it had been done with random...

    R. Girija, H. Singh, G. Abirami in Multimedia Tools and Applications
    Article 20 September 2022
  6. An analytical review of current S-box design methodologies, performance evaluation criteria, and major challenges

    The expansion of worldwide networking has created new possibilities for management, development, and presentation in the form of digital data. The...

    Adil Waheed, Fazli Subhan, ... Sohaib Ahmad in Multimedia Tools and Applications
    Article 04 March 2023
  7. An S-Box construction from exponentiation in finite fields and its application in RGB color image encryption

    In this study, the utilization of exponentiation in finite fields is investigated for the purpose of generating pseudo-random sequences which have a...

    Steven T. Dougherty, Joseph Klobusicky, ... Deniz Ustun in Multimedia Tools and Applications
    Article 11 October 2023
  8. Robust medical and color image cryptosystem using array index and chaotic S-box

    Providing robust security within an image cryptosystem during network communication is more essential than ever, highlighting the fundamental aspects...

    Durgabati Podder, Subhrajyoti Deb, ... Aditya Kumar Sahu in Cluster Computing
    Article 12 June 2024
  9. Fisher-Yates scrambling algorithm combined with S-box color image encryption technology based on 3D-SCCM chaotic system

    Due to the rapid popularization of the Internet age, while facing a large number of information sharing and convenience, we are also facing the fact...

    Wan-ting Wang, **g-yu Sun, ... Hao Zhang in Multimedia Tools and Applications
    Article 28 April 2023
  10. Construction of S-box based on chaotic piecewise map: Watermark application

    The spread of using communication technologies has made it necessary to take certain measures to prevent illegal copying. Watermarking techniques are...

    R. Hoseini Sani, S. Behnia, J. Ziaei in Multimedia Tools and Applications
    Article 14 June 2022
  11. Reconfigurable color medical image encryptor using hardware accelerated Chao(S)-box triplets

    In telemedicine applications, the security of digitized medical images plays a vital role globally. Field Programmable Gate Array (FPGA)-based...

    Vinoth Raj, Siva Janakiraman, Rengarajan Amirtharajan in Journal of Real-Time Image Processing
    Article 04 March 2023
  12. A novel color image encryption scheme based on a new dynamic compound chaotic map and S-box

    In modern technological era image encryption has become an attractive and interesting field for researchers. They work for improving the security of...

    Tahir Sajjad Ali, Rashid Ali in Multimedia Tools and Applications
    Article 11 March 2022
  13. Using Symmetric Group to Generate Dynamic S-box

    The main purpose of utilizing s-box (static, or dynamic) is to encrypt data with/without decrypt cipher-data, s-box may be a public in the cipher...
    Kareem Abbas Alghurabi, Ahmed J. Obaid, ... Salah A. Albermany in Artificial Intelligence and Data Science
    Conference paper 2022
  14. A (tn) threshold quantum image secret sharing scheme

    In this paper, a ( t n ) threshold quantum image secret sharing scheme based on combination theory is proposed. Here, the threshold t is a constant...

    Hua-Kun Wang, Guang-Bao Xu, ... Dong-Huan Jiang in Multimedia Tools and Applications
    Article 29 February 2024
  15. Improved Truncated Differential Distinguishers of AES with Concrete S-Box

    The security of Advanced Encryption Standard (AES) is one of the most important issues in cryptanalysis. In ToSC 2020, Bao et al. proposed an open...
    Chengcheng Chang, Meiqin Wang, ... Wei Wang in Progress in Cryptology – INDOCRYPT 2022
    Conference paper 2022
  16. On recovering block cipher secret keys in the cold boot attack setting

    This paper presents a general strategy to recover a block cipher secret key in the cold boot attack setting. More precisely, we propose a...

    Gustavo Banegas, Ricardo Villanueva-Polanco in Cryptography and Communications
    Article Open access 13 February 2023
  17. S-box Pooling: Towards More Efficient Side-Channel Security Evaluations

    Nowadays, profiled attacks are the standard penetration tests for security evaluations. Often the security evaluators have to perform profiled...
    Yuanyuan Zhou, François-Xavier Standaert in Applied Cryptography and Network Security Workshops
    Conference paper 2022
  18. Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization

    Cryptography often involves substituting (and converting) the secret information into dummy data so that it could reach the desired destination...

    Kamal Z. Zamli, Abdul Kader, ... Hussam S. Alhadawi in Neural Computing and Applications
    Article 26 June 2021
  19. A new fair multi-secret sharing scheme based on asymmetric bivariate polynomial

    In a ( t , n ) secret sharing scheme, cheating identification provides a very effective way to protect the security of the secret. In this paper, we...

    Fulin Li, Yang Liu, ... Shixin Zhu in Cryptography and Communications
    Article 31 March 2022
  20. New attacks on secret sharing-based data outsourcing: toward a resistant scheme

    In this paper, two new practical attacks on some secret sharing-based data outsourcing schemes are first introduced, and several other security and...

    Peyman Rahmani, Seyed Mostafa Fakhrahmad, Mohammad Taheri in The Journal of Supercomputing
    Article 25 April 2022
Did you find what you were looking for? Share feedback.