We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 61-80 of 3,033 results
  1. Revised Version of Block Cipher CHAM

    CHAM is a family of lightweight block ciphers published in 2017 [22]. The CHAM family consists of three ciphers, CHAM-64/128, CHAM-128/128, and...
    Dongyoung Roh, Bonwook Koo, ... Woo-Hwan Kim in Information Security and Cryptology – ICISC 2019
    Conference paper 2020
  2. Light-OCB: Parallel Lightweight Authenticated Cipher with Full Security

    This paper proposes a lightweight authenticated encryption (AE) scheme, called Light-OCB, which can be viewed as a lighter variant of the CAESAR...
    Avik Chakraborti, Nilanjan Datta, ... Mridul Nandi in Security, Privacy, and Applied Cryptography Engineering
    Conference paper 2022
  3. Generalized Feistel Ciphers for Efficient Prime Field Masking

    A recent work from Eurocrypt 2023 suggests that prime-field masking has excellent potential to improve the efficiency vs. security tradeoff of masked...
    Lorenzo Grassi, Loïc Masure, ... François-Xavier Standaert in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  4. FPGA Implementation of PICO Cipher

    The rise in ubiquitous computing connecting resource-constrained devices had led to the emergence of a sub-domain in cryptography called lightweight...
    Conference paper 2021
  5. Implementation of AES Algorithm

    AES, which stands for Advanced Encryption Standard is the most used symmetric block cipher based on the secured symmetric encryption algorithm. It...
    V. Priyanka Brahmaiah, P. V. Jaswantth, ... M. Pallavi Sudha in IOT with Smart Systems
    Conference paper 2023
  6. State-of-the-Art Lightweight Cryptographic Protocols for IoT Networks

    Due to technical improvements, the Internet of Things has enabled the networking of devices capable of collecting vast volumes of data. Consequently,...
    Conference paper 2023
  7. Characterizing a Time–Memory Tradeoff Against PudgyTurtle

    PudgyTurtle is not a cipher, but rather an alternative way to utilize the keystream in binary-additive stream-cipher cryptosystems. Instead of...

    David A. August, Anne C. Smith in SN Computer Science
    Article Open access 27 June 2023
  8. VLSI Implementation of BCH Encoder with Triple DES Encryption for Baseband Transceiver

    This paper proposes the implementation of BCH Encoder in the ZYNQ-7000 AP SOC to guarantee the sensitive data that is acquired from capsule endoscopy...
    N. Dhandapani, M. Z. Mohamed Ashik, ... Deepa Jose in Mobile Radio Communications and 5G Networks
    Conference paper 2023
  9. Authenticated Encryption Engine for IoT Application

    With the increase of connected devices in IoT paradigm for various domains that include wireless sensor networks, edge computing, embedded systems....
    Heera Wali, B. H. Shraddha, Nalini C. Iyer in Hybrid Intelligent Systems
    Conference paper 2023
  10. Automated Search for Block Cipher Differentials: A GPU-Accelerated Branch-and-Bound Algorithm

    In this paper, we propose a GPU-accelerated branch-and-bound algorithm. The proposed approach substantially increases the performance of the...
    Wei-Zhu Yeoh, Je Sen Teh, Jiageng Chen in Information Security and Privacy
    Conference paper 2020
  11. A Novel Image Encryption Technique Using Modified Grain-128

    In this work, an alternative version to the stream cipher Grain-128 and an image encryption technique have been proposed. First, the new design is...
    Aissa Belmeguenai, Herbadji Djamel, ... Berrak Oulaya in Machine Learning for Networking
    Conference paper 2024
  12. Secure Communications by Using Atangana-Baleanu Fractional Derivative

    In this chapter the authors propose to use fractional-order chaotic systemFractional-order chaotic system s for data encryption, the encryption is a...
    Rafael Martínez-Guerra, Juan Javier Montesinos-García, Juan Pablo Flores-Flores in Encryption and Decryption Algorithms for Plain Text and Images using Fractional Calculus
    Chapter 2023
  13. Cube attacks on round-reduced TinyJAMBU

    Lightweight cryptography has recently gained importance as the number of Internet of things (IoT) devices connected to Internet grows. Its main goal...

    Wil Liam Teng, Iftekhar Salam, ... Raphaël C.-W. Phan in Scientific Reports
    Article Open access 29 March 2022
  14. Image pixels swap** encryption based on the TetraVex game and a publicly hash-sharing algorithm

    Traditionally, keys are generated using the hash value of the given image in the image cryptography to boost the security effects. The keys have been...

    Muhammad Hussain, Nadeem Iqbal, Zia Bashir in Cluster Computing
    Article 19 January 2024
  15. An S-box Design Using Irreducible Polynomial with Affine Transformation for Lightweight Cipher

    Traditional cryptographic block cipher algorithms are often unsuitable for low-resource profiled IoT (Internet of Things) devices. A lightweight...
    Muhammad Rana, Quazi Mamun, Rafiqul Islam in Quality, Reliability, Security and Robustness in Heterogeneous Systems
    Conference paper 2021
  16. A new encryption model for multimedia content using two dimensional Brownian motion and coupled map lattice

    An image encryption model is presented in this paper. The model uses two-dimensional Brownian Motion as a source of confusion and diffusion in image...

    Mukesh Rawat, Anil Singh Bafila, ... Sanjeev Singh in Multimedia Tools and Applications
    Article 13 April 2023
  17. Pholkos – Efficient Large-State Tweakable Block Ciphers from the AES Round Function

    This paper proposes Pholkos, a family of heavyweight tweakable block ciphers with state and key sizes of...
    Jannis Bossert, Eik List, ... Sebastian Schmitz in Topics in Cryptology – CT-RSA 2022
    Conference paper 2022
  18. Novel secure data protection scheme using Martino homomorphic encryption

    Globally, data maintenance and its security are vital tasks due to the rapid development of advanced technologies. Users now utilise Cloud computing...

    Ch. Rupa, Greeshmanth, Mohd Asif Shah in Journal of Cloud Computing
    Article Open access 27 March 2023
  19. A new dynamic DNA-coding model for gray-scale image encryption

    To protect the images and provide a more secure cipher image, DNA encoding is crucial in image encryption. Applying a single, easily detectable...

    Yasmine M. Afify, Nada H. Sharkawy, ... Nagwa Badr in Complex & Intelligent Systems
    Article Open access 04 August 2023
  20. Beyond Quadratic Speedups in Quantum Attacks on Symmetric Schemes

    In this paper, we report the first quantum key-recovery attack on a symmetric block cipher design, using classical queries only, with a more than...
    Xavier Bonnetain, André Schrottenloher, Ferdinand Sibleyras in Advances in Cryptology – EUROCRYPT 2022
    Conference paper 2022
Did you find what you were looking for? Share feedback.