Results 61 to 70 of about 458 (184)

A new method to solve MRHS equation systems and its connection to group factorization

open access: yesJournal of Mathematical Cryptology, 2013
Multiple right-hand side (MRHS) equations over finite fields are a relatively new tool useful for algebraic cryptanalysis. The main advantage is in an efficient representation of the cryptographic primitives.
Zajac Pavol
doaj   +1 more source

A robust approach to satellite image encryption using chaotic map and circulant matrices

open access: yesEngineering Reports, Volume 6, Issue 12, December 2024.
The graphical abstract depicts an advanced image encryption technique utilizing hyperbolic tangent tent maps and Hill cipher substitution. The process ensures robust security by integrating XOR operations and Kronecker expansion to transform a plain image into its encrypted counterpart using carefully crafted secret keys.
Shamsa Kanwal   +6 more
wiley   +1 more source

Algebraic side‐channel attacks on Trivium stream cipher

open access: yesIET Communications, Volume 18, Issue 19, Page 1335-1347, December 2024.
In this paper, the authors show that the first Algebraic Side‐Channel Attacks on Trivium are implemented both in ASIC under Hamming distance leakage model and in microcontrollers of different buses under Hamming weight leakage model. Abstract Algebraic Side‐Channel Attacks (ASCAs), first proposed by Renauld and Standaert in 2009, are a potent ...
Wenlong Sun, Jie Guan
wiley   +1 more source

The Cryptanalysis Of The Enigma Cipher. The Plugboard And The Cryptologic Bomb.

open access: yesComputer Science, 2014
We study the problem of decoding secret messages encrypted by the German Army with the M3 Enigma machine after September 15, 1938. We focused our attention on the algorithmization and programming of this problem. A completion and optimization of Zygalski’
Anna Borowska, Elzbieta Rzeszutko
doaj   +1 more source

A literature review on V2X communications security: Foundation, solutions, status, and future

open access: yesIET Communications, Volume 18, Issue 20, Page 1683-1715, December 2024.
The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV ...
Zuobin Ying   +3 more
wiley   +1 more source

Key Generation Using Generalized Pell’s Equation in Public Key Cryptography Based on the Prime Fake Modulus Principle to Image Encryption and Its Security Analysis

open access: yesCybernetics and Information Technologies, 2020
RSA is one among the most popular public key cryptographic algorithm for security systems. It is explored in the results that RSA is prone to factorization problem, since it is sharing common modulus and public key exponent.
Raghunandan K. R.   +3 more
doaj   +1 more source

Quantum calculi and formalisms for system and network security: A bibliographic insights and synoptic review

open access: yesIET Quantum Communication, Volume 5, Issue 4, Page 486-515, December 2024.
Quantum calculi and formalisms aid in designing and analysing new cryptographic protocols for blockchain, assessing the feasibility and security of quantum algorithms, and building a quantum‐safe blockchain system. Bibliometric analysis is performed using R language and automated tools to identify key institutions, authors, organisations, and ...
Adarsh Kumar   +2 more
wiley   +1 more source

Improvement and evaluation for algebraic fault attacks on PRESENT

open access: yesTongxin xuebao, 2016
An enhanced algebraic fault analysis on PRESENT was proposed.Algebraic cryptanalysis was introduced to build the algebraic equations for both the target cipher and faults.The equation set of PRESENT was built reversely in order to accelerate the solving ...
Jing HUANG   +6 more
doaj   +2 more sources

Unveiling the Neutral Difference and Its Automated Search

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
Given a differential characteristic and an existing plaintext pair that satisfies it (referred to as a right pair), generating additional right pairs at a reduced cost is an appealing prospect. The neutral bit technique, referred to as neutral differences throughout this paper, provides a solution to this challenge.
Guangqiu Lv   +4 more
wiley   +1 more source

Cryptanalysis of Selected ARX-Based Block Ciphers

open access: yesVietnam Journal of Computer Science
The security of digital communication and information systems is mostly dependent on block ciphers. ARX-based ciphers are widely used due to their simplicity and efficiency.
Praveen Kumar Gundaram
doaj   +1 more source

Home - About - Disclaimer - Privacy