Results 51 to 60 of about 458 (184)

A Fast Search Method for 3‐Share Second‐Order Masking Schemes for Lightweight S‐Boxes

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Masking schemes are widely adopted strategies for countering side‐channel analysis (SCA) attacks. The initial hardware masking strategy, threshold implementation (TI), provides robust security against glitches in hardware platforms. The minimum number of shares required for a TI scheme depends not only on the desired security order but also on the ...
Yanhong Fan   +4 more
wiley   +1 more source

A Method of Ultra-Large-Scale Matrix Inversion Using Block Recursion

open access: yesInformation, 2020
Ultra-large-scale matrix inversion has been applied as the fundamental operation of numerous domains, owing to the growth of big data and matrix applications.
HouZhen Wang, Yan Guo, HuanGuo Zhang
doaj   +1 more source

Post‐Quantum Digital Signatures for Enhanced Medical Image Security

open access: yesIET Quantum Communication, Volume 6, Issue 1, January/December 2025.
This study explores the use of Sphincs+, Dilithium, and Falcon to enhance the security of medical images against quantum threats. By leveraging digital signatures for authentication and integrity verification, the proposed approach mitigates risks of tampering and ensures the reliability of healthcare records.
Kumar Sekhar Roy   +5 more
wiley   +1 more source

Algebraic Cryptanalysis of GOST Encryption Algorithm

open access: yesJournal of Computer and Communications, 2014
This paper observes approaches to algebraic analysis of GOST 28147-89 encryption algorithm (also known as simply GOST), which is the basis of most secure information systems in Russia. The general idea of algebraic analysis is based on the representation of initial encryption algorithm as a system of multivariate quadratic equations, which define ...
Ekaterina Maro, Ludmila Babenko
openaire   +3 more sources

A Novel Method of Data Protection Through DNA Chromosome Databases

open access: yesApplied Computational Intelligence and Soft Computing, Volume 2025, Issue 1, 2025.
With the advancement of the digital age, data have become insecure, which requires techniques to secure data. Deoxyribonucleic acid (DNA) has become an increasingly secure technology for storing next‐generation digital data. DNA provides superior capabilities due to its high and efficient storage capacity and long lifespan.
Sadoon Hussein   +2 more
wiley   +1 more source

Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems

open access: yesIET Information Security, 2023
In this paper, improved preimage attacks are presented on 3‐round Keccak‐256 and Keccak‐512 and 4‐round Keccak‐256 based on algebraic methods. The authors propose some new properties about the components of Keccak permutation, reconsider the existing ...
Junling Pei, Lusheng Chen
doaj   +1 more source

Complexity Engineering: How Subjective Issues Become Objective

open access: yesComplexity, Volume 2025, Issue 1, 2025.
This study details the substantial technological progress experienced in the last few decades, its impact on engineering, and how machine learning along with data science can contribute to solving human problems. The objective here is to establish the principles of “complexity engineering,” based on the works of Edgar Morin, and to demonstrate how ...
José Roberto C. Piqueira   +3 more
wiley   +1 more source

Influence of the Linear Layer on the Algebraic Degree in SP-Networks

open access: yesIACR Transactions on Symmetric Cryptology, 2022
We consider SPN schemes, i.e., schemes whose non-linear layer is defined as the parallel application of t ≥ 1 independent S-Boxes over F2n and whose linear layer is defined by the multiplication with a (n · t) × (n · t) matrix over F2.
Carlos Cid   +5 more
doaj   +1 more source

Comprehensive Analysis of Lightweight Cryptographic Algorithms for Battery‐Limited Internet of Things Devices

open access: yesInternational Journal of Distributed Sensor Networks, Volume 2025, Issue 1, 2025.
The growth of billions of devices functioning in resource‐constrained situations in the Internet of Things (IoT) era poses serious security issues. As a result of their limited processing power efficiency, memory, and battery life, traditional cryptographic algorithms like elliptic curve cryptography (ECC), Rivest–Shamir–Adleman (RSA), and Advanced ...
Nahom Gebeyehu Zinabu   +4 more
wiley   +1 more source

A Unified Approach to Image Recognition and Cryptography via Flexible Weak Inverse Property Quasigroups

open access: yesJournal of Function Spaces, Volume 2025, Issue 1, 2025.
Nonassociative algebra presents multiple options for comprehending and dealing with difficulties in graph theory, artificial intelligence, and cryptography. Its distinctive traits introduce genuine concepts and procedures not found in conventional associative algebra, yielding to new results from studies and breakthroughs in multiple disciplines ...
Mohammad Mazyad Hazzazi   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy