Results 81 to 90 of about 6,764 (215)
A robust approach to satellite image encryption using chaotic map and circulant matrices
The graphical abstract depicts an advanced image encryption technique utilizing hyperbolic tangent tent maps and Hill cipher substitution. The process ensures robust security by integrating XOR operations and Kronecker expansion to transform a plain image into its encrypted counterpart using carefully crafted secret keys.
Shamsa Kanwal +6 more
wiley +1 more source
Improvement and evaluation for algebraic fault attacks on PRESENT
An enhanced algebraic fault analysis on PRESENT was proposed.Algebraic cryptanalysis was introduced to build the algebraic equations for both the target cipher and faults.The equation set of PRESENT was built reversely in order to accelerate the solving ...
Jing HUANG +6 more
doaj +2 more sources
RSA is one among the most popular public key cryptographic algorithm for security systems. It is explored in the results that RSA is prone to factorization problem, since it is sharing common modulus and public key exponent.
Raghunandan K. R. +3 more
doaj +1 more source
Random Permutation Statistics and An Improved Slide-Determine Attack on KeeLoq [PDF]
KeeLoq is a lightweight block cipher which is extensively used in the automotive industry. Its periodic structure, and overall simplicity makes it vulnerable to many different attacks.
Bard, GV, Courtois, NT
core
Algebraic side‐channel attacks on Trivium stream cipher
In this paper, the authors show that the first Algebraic Side‐Channel Attacks on Trivium are implemented both in ASIC under Hamming distance leakage model and in microcontrollers of different buses under Hamming weight leakage model. Abstract Algebraic Side‐Channel Attacks (ASCAs), first proposed by Renauld and Standaert in 2009, are a potent ...
Wenlong Sun, Jie Guan
wiley +1 more source
Cryptanalysis of Selected ARX-Based Block Ciphers
The security of digital communication and information systems is mostly dependent on block ciphers. ARX-based ciphers are widely used due to their simplicity and efficiency.
Praveen Kumar Gundaram
doaj +1 more source
Cryptanalysis of McEliece Cryptosystem Based on Algebraic Geometry Codes and their subcodes
We give polynomial time attacks on the McEliece public key cryptosystem based either on algebraic geometry (AG) codes or on small codimensional subcodes of AG codes.
Couvreur, Alain +2 more
core +1 more source
Quantum Algorithms for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems [PDF]
Decision of whether a Boolean equation system has a solution is an NPC problem and finding a solution is NP hard. In this paper, we present a quantum algorithm to decide whether a Boolean equation system FS has a solution and compute one if FS does have ...
Chen, Yu-Ao, Gao, Xiao-Shan
core +1 more source
A literature review on V2X communications security: Foundation, solutions, status, and future
The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV ...
Zuobin Ying +3 more
wiley +1 more source
A note on some algebraic trapdoors for block ciphers
We provide sufficient conditions to guarantee that a translation based cipher is not vulnerable with respect to the partition-based trapdoor. This trapdoor has been introduced, recently, by Bannier et al.
Calderini, Marco
core

