Search
Search Results
-
SCARE and power attack on AES-like block ciphers with secret S-box
Despite Kerckhoff’s principle, there are secret ciphers with unknown components for diplomatic or military usages. The side-channel analysis of...
-
Detection of non-trivial preservable quotient spaces in S-Box(es)
Substitution Box (S-Box) is employed in block ciphers to ensure non-linearity. An n -bit bijective S-Box is a member of the Symmetric Group
... -
A chaos-based novel approach to video encryption using dynamic S-box
Video Encryption is the process of converting the video into an unrecognizable form to protect it from unauthorized access. This paper proposes a...
-
A new steganographic algorithm based on coupled chaotic maps and a new chaotic S-box
The art of concealing information by embedding it in a seemingly “innocent” message is called steganography. An appropriate system for steganography...
-
Cryptanalysis of DRPE using complex S-Box based on linear canonical transform
During recent decades, double random phase encoding grasped more attention for researchers. To achieve nonlinearity, it had been done with random...
-
An analytical review of current S-box design methodologies, performance evaluation criteria, and major challenges
The expansion of worldwide networking has created new possibilities for management, development, and presentation in the form of digital data. The...
-
An S-Box construction from exponentiation in finite fields and its application in RGB color image encryption
In this study, the utilization of exponentiation in finite fields is investigated for the purpose of generating pseudo-random sequences which have a...
-
Robust medical and color image cryptosystem using array index and chaotic S-box
Providing robust security within an image cryptosystem during network communication is more essential than ever, highlighting the fundamental aspects...
-
Fisher-Yates scrambling algorithm combined with S-box color image encryption technology based on 3D-SCCM chaotic system
Due to the rapid popularization of the Internet age, while facing a large number of information sharing and convenience, we are also facing the fact...
-
Construction of S-box based on chaotic piecewise map: Watermark application
The spread of using communication technologies has made it necessary to take certain measures to prevent illegal copying. Watermarking techniques are...
-
Reconfigurable color medical image encryptor using hardware accelerated Chao(S)-box triplets
In telemedicine applications, the security of digitized medical images plays a vital role globally. Field Programmable Gate Array (FPGA)-based...
-
A novel color image encryption scheme based on a new dynamic compound chaotic map and S-box
In modern technological era image encryption has become an attractive and interesting field for researchers. They work for improving the security of...
-
Using Symmetric Group to Generate Dynamic S-box
The main purpose of utilizing s-box (static, or dynamic) is to encrypt data with/without decrypt cipher-data, s-box may be a public in the cipher... -
A (t, n) threshold quantum image secret sharing scheme
In this paper, a ( t , n ) threshold quantum image secret sharing scheme based on combination theory is proposed. Here, the threshold t is a constant...
-
Improved Truncated Differential Distinguishers of AES with Concrete S-Box
The security of Advanced Encryption Standard (AES) is one of the most important issues in cryptanalysis. In ToSC 2020, Bao et al. proposed an open... -
On recovering block cipher secret keys in the cold boot attack setting
This paper presents a general strategy to recover a block cipher secret key in the cold boot attack setting. More precisely, we propose a...
-
S-box Pooling: Towards More Efficient Side-Channel Security Evaluations
Nowadays, profiled attacks are the standard penetration tests for security evaluations. Often the security evaluators have to perform profiled... -
Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization
Cryptography often involves substituting (and converting) the secret information into dummy data so that it could reach the desired destination...
-
A new fair multi-secret sharing scheme based on asymmetric bivariate polynomial
In a ( t , n ) secret sharing scheme, cheating identification provides a very effective way to protect the security of the secret. In this paper, we...
-
New attacks on secret sharing-based data outsourcing: toward a resistant scheme
In this paper, two new practical attacks on some secret sharing-based data outsourcing schemes are first introduced, and several other security and...