Results 1 to 10 of about 6,665 (199)

A Fast Search Method for 3‐Share Second‐Order Masking Schemes for Lightweight S‐Boxes

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Masking schemes are widely adopted strategies for countering side‐channel analysis (SCA) attacks. The initial hardware masking strategy, threshold implementation (TI), provides robust security against glitches in hardware platforms. The minimum number of shares required for a TI scheme depends not only on the desired security order but also on the ...
Yanhong Fan   +4 more
wiley   +1 more source

Key Generation Using Generalized Pell’s Equation in Public Key Cryptography Based on the Prime Fake Modulus Principle to Image Encryption and Its Security Analysis

open access: yesCybernetics and Information Technologies, 2020
RSA is one among the most popular public key cryptographic algorithm for security systems. It is explored in the results that RSA is prone to factorization problem, since it is sharing common modulus and public key exponent.
Raghunandan K. R.   +3 more
doaj   +1 more source

Random Permutation Statistics and An Improved Slide-Determine Attack on KeeLoq [PDF]

open access: yes, 2011
KeeLoq is a lightweight block cipher which is extensively used in the automotive industry. Its periodic structure, and overall simplicity makes it vulnerable to many different attacks.
Bard, GV, Courtois, NT
core  

Post‐Quantum Digital Signatures for Enhanced Medical Image Security

open access: yesIET Quantum Communication, Volume 6, Issue 1, January/December 2025.
This study explores the use of Sphincs+, Dilithium, and Falcon to enhance the security of medical images against quantum threats. By leveraging digital signatures for authentication and integrity verification, the proposed approach mitigates risks of tampering and ensures the reliability of healthcare records.
Kumar Sekhar Roy   +5 more
wiley   +1 more source

Improvement and evaluation for algebraic fault attacks on PRESENT

open access: yesTongxin xuebao, 2016
An enhanced algebraic fault analysis on PRESENT was proposed.Algebraic cryptanalysis was introduced to build the algebraic equations for both the target cipher and faults.The equation set of PRESENT was built reversely in order to accelerate the solving ...
Jing HUANG   +6 more
doaj   +2 more sources

The Cryptanalysis Of The Enigma Cipher. The Plugboard And The Cryptologic Bomb.

open access: yesComputer Science, 2014
We study the problem of decoding secret messages encrypted by the German Army with the M3 Enigma machine after September 15, 1938. We focused our attention on the algorithmization and programming of this problem. A completion and optimization of Zygalski’
Anna Borowska, Elzbieta Rzeszutko
doaj   +1 more source

Quantum Algorithms for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems [PDF]

open access: yes, 2018
Decision of whether a Boolean equation system has a solution is an NPC problem and finding a solution is NP hard. In this paper, we present a quantum algorithm to decide whether a Boolean equation system FS has a solution and compute one if FS does have ...
Chen, Yu-Ao, Gao, Xiao-Shan
core   +1 more source

Tamper Localisation Using Quantum Fourier Transform Signatures for Medical Image Authentication

open access: yesIET Quantum Communication, Volume 6, Issue 1, January/December 2025.
We present a tamper‐localisation framework that embeds authentication signatures as phase‐only perturbations in blockwise QFT coefficients using keyed sparse mid‐band supports and light cross‐block coupling, preserving magnitudes (energy) and imperceptibility.
Kumar Sekhar Roy   +4 more
wiley   +1 more source

A Novel Method of Data Protection Through DNA Chromosome Databases

open access: yesApplied Computational Intelligence and Soft Computing, Volume 2025, Issue 1, 2025.
With the advancement of the digital age, data have become insecure, which requires techniques to secure data. Deoxyribonucleic acid (DNA) has become an increasingly secure technology for storing next‐generation digital data. DNA provides superior capabilities due to its high and efficient storage capacity and long lifespan.
Sadoon Hussein   +2 more
wiley   +1 more source

Cryptanalysis of Selected ARX-Based Block Ciphers

open access: yesVietnam Journal of Computer Science
The security of digital communication and information systems is mostly dependent on block ciphers. ARX-based ciphers are widely used due to their simplicity and efficiency.
Praveen Kumar Gundaram
doaj   +1 more source

Home - About - Disclaimer - Privacy