Results 71 to 80 of about 6,764 (215)

Tamper Localisation Using Quantum Fourier Transform Signatures for Medical Image Authentication

open access: yesIET Quantum Communication, Volume 6, Issue 1, January/December 2025.
We present a tamper‐localisation framework that embeds authentication signatures as phase‐only perturbations in blockwise QFT coefficients using keyed sparse mid‐band supports and light cross‐block coupling, preserving magnitudes (energy) and imperceptibility.
Kumar Sekhar Roy   +4 more
wiley   +1 more source

Influence of the Linear Layer on the Algebraic Degree in SP-Networks

open access: yesIACR Transactions on Symmetric Cryptology, 2022
We consider SPN schemes, i.e., schemes whose non-linear layer is defined as the parallel application of t ≥ 1 independent S-Boxes over F2n and whose linear layer is defined by the multiplication with a (n · t) × (n · t) matrix over F2.
Carlos Cid   +5 more
doaj   +1 more source

A Novel Method of Data Protection Through DNA Chromosome Databases

open access: yesApplied Computational Intelligence and Soft Computing, Volume 2025, Issue 1, 2025.
With the advancement of the digital age, data have become insecure, which requires techniques to secure data. Deoxyribonucleic acid (DNA) has become an increasingly secure technology for storing next‐generation digital data. DNA provides superior capabilities due to its high and efficient storage capacity and long lifespan.
Sadoon Hussein   +2 more
wiley   +1 more source

Algebraic Precomputations in Differential Cryptanalysis

open access: yes, 2010
Algebraic cryptanalysis is a general tool which permits one to assess the security of a wide range of cryptographic schemes. Algebraic techniques have been successfully applied against a number of multivariate schemes and stream ciphers. Yet, their feasibility against block ciphers remains the source of much speculation.
Albrecht, Martin   +4 more
openaire   +14 more sources

A new method to solve MRHS equation systems and its connection to group factorization

open access: yesJournal of Mathematical Cryptology, 2013
Multiple right-hand side (MRHS) equations over finite fields are a relatively new tool useful for algebraic cryptanalysis. The main advantage is in an efficient representation of the cryptographic primitives.
Zajac Pavol
doaj   +1 more source

Complexity Engineering: How Subjective Issues Become Objective

open access: yesComplexity, Volume 2025, Issue 1, 2025.
This study details the substantial technological progress experienced in the last few decades, its impact on engineering, and how machine learning along with data science can contribute to solving human problems. The objective here is to establish the principles of “complexity engineering,” based on the works of Edgar Morin, and to demonstrate how ...
José Roberto C. Piqueira   +3 more
wiley   +1 more source

Comprehensive Analysis of Lightweight Cryptographic Algorithms for Battery‐Limited Internet of Things Devices

open access: yesInternational Journal of Distributed Sensor Networks, Volume 2025, Issue 1, 2025.
The growth of billions of devices functioning in resource‐constrained situations in the Internet of Things (IoT) era poses serious security issues. As a result of their limited processing power efficiency, memory, and battery life, traditional cryptographic algorithms like elliptic curve cryptography (ECC), Rivest–Shamir–Adleman (RSA), and Advanced ...
Nahom Gebeyehu Zinabu   +4 more
wiley   +1 more source

Algebraic Cryptanalysis of Ascon Using MRHS Equations

open access: yesTatra Mountains Mathematical Publications
Abstract Ascon is a family of lightweight authenticated encryption and hashing algorithms, which is a finalist in the NIST Lightweight Cryptography competition. We study the Ascon algorithm from the perspective of algebraic cryptanalysis based on the MRHS representation of the cipher. We call such an approach an MRHS cryptanalysis.
Smičík, Miloslav, Zajac, Pavol
openaire   +2 more sources

A Unified Approach to Image Recognition and Cryptography via Flexible Weak Inverse Property Quasigroups

open access: yesJournal of Function Spaces, Volume 2025, Issue 1, 2025.
Nonassociative algebra presents multiple options for comprehending and dealing with difficulties in graph theory, artificial intelligence, and cryptography. Its distinctive traits introduce genuine concepts and procedures not found in conventional associative algebra, yielding to new results from studies and breakthroughs in multiple disciplines ...
Mohammad Mazyad Hazzazi   +5 more
wiley   +1 more source

The Cryptanalysis Of The Enigma Cipher. The Plugboard And The Cryptologic Bomb.

open access: yesComputer Science, 2014
We study the problem of decoding secret messages encrypted by the German Army with the M3 Enigma machine after September 15, 1938. We focused our attention on the algorithmization and programming of this problem. A completion and optimization of Zygalski’
Anna Borowska, Elzbieta Rzeszutko
doaj   +1 more source

Home - About - Disclaimer - Privacy