Results 11 to 20 of about 1,200 (188)

Algebraic Persistent Fault Analysis of SKINNY_64 Based on S_Box Decomposition

open access: yesEntropy, 2022
Algebraic persistent fault analysis (APFA), which combines algebraic analysis with persistent fault attacks, brings new challenges to the security of lightweight block ciphers and has received widespread attention since its introduction.
Xing Fang   +5 more
doaj   +1 more source

An efficient deep learning model for brain tumour detection with privacy preservation

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Internet of medical things (IoMT) is becoming more prevalent in healthcare applications as a result of current AI advancements, helping to improve our quality of life and ensure a sustainable health system. IoMT systems with cutting‐edge scientific capabilities are capable of detecting, transmitting, learning and reasoning.
Mujeeb Ur Rehman   +8 more
wiley   +1 more source

Strengthening Crypto-1 Cipher Against Algebraic Attacks

open access: yesJournal of ICT Research and Applications, 2015
In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity.
Farah Afianti, Ari M. Barmawi
doaj   +1 more source

Efficient Image Encryption Based on New Substitution Box Using DNA Coding and Bent Function

open access: yesIEEE Access, 2022
This study contributes to creating an unbreakable S-Box based on a strong bent function expanded by DNA sequences and investigates and analyzes the strength of the proposed S-Box against major standard criteria and benchmarks, such as interpolation ...
Hend Ali Mohammed Ali Basha   +3 more
doaj   +1 more source

Algebraic Side-Channel Attacks [PDF]

open access: yes, 2010
In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However, although a number of convincing experiments have been performed against certain reduced algorithms, it is not clear whether these attacks can be successfully applied in general and ...
Mathieu Renauld   +1 more
openaire   +1 more source

Algebraic Attacks on RAIN and AIM Using Equivalent Representations

open access: yesIACR Transactions on Symmetric Cryptology, 2023
Designing novel symmetric-key primitives for advanced protocols like secure multiparty computation (MPC), fully homomorphic encryption (FHE) and zero-knowledge proof systems (ZK), has been an important research topic in recent years.
Fukang Liu   +3 more
doaj   +1 more source

Algebraic Attacks on Combiners with Memory [PDF]

open access: yes, 2003
Recently, algebraic attacks were proposed to attack several cryptosystems, e.g. AES, LILI-128 and Toyocrypt. This paper extends the use of algebraic attacks to combiners with memory. A (k,l)-combiner consists of k parallel linear feedback shift registers (LFSRs), and the nonlinear filtering is done via a finite automaton with k input bits and l memory ...
Armknecht, Frederik, Krause, Matthias
openaire   +1 more source

New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting

open access: yesIACR Transactions on Symmetric Cryptology, 2022
The security of the post-quantum signature scheme Picnic is highly related to the difficulty of recovering the secret key of LowMC from a single plaintext-ciphertext pair.
Fukang Liu   +3 more
doaj   +3 more sources

Algebraic Side Channel Attack on Trivium and Grain Ciphers

open access: yesIEEE Access, 2017
Solving a system of multivariate quadratic equations obtained through algebraic cryptanalysis is a nondeterministic polynomial time-complete problem. Owing to the trend of stream ciphers based on nonlinear update, the success of algebraic attacks has ...
Asif Raza Kazmi   +4 more
doaj   +1 more source

Accuracy and applicability of periodontitis risk assessment tools: A critical appraisal

open access: yesPeriodontology 2000, EarlyView., 2023
Abstract Currently, periodontal risk assessment finds application at first visit (to identify individuals at high risk of either disease incidence, if still healthy, or disease progression, if already diseased) as well as at patient monitoring after active treatment and enrolment in a supportive periodontal care program.
Roberto Farina   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy