Results 31 to 40 of about 26,610 (180)
Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock [PDF]
LBlock is a lightweight block cipher proposed in ACNS 2011. It has a 64-bit block size and 80-bit key size which is the typical parameter setting accepted by most of the recent proposed lightweight block ciphers. It has fast hardware implementation efficiency and it still remains rather secure considering the recent results and the security margin it ...
Chen, Jiageng, Miyaji, Atsuko
openaire +2 more sources
Quantum differential cryptanalysis to the block ciphers
Differential cryptanalysis is one of the most popular methods in attacking block ciphers. However, there still some limitations in traditional differential cryptanalysis.
Li, Hong-Wei, Yang, Li
core +1 more source
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers
This paper serves as a systematization of knowledge of linear cryptanalysis and provides novel insights in the areas of key schedule design and tweakable block ciphers.
Thorsten Kranz +2 more
doaj +1 more source
Deciphering a novel image cipher based on mixed transformed Logistic maps [PDF]
Since John von Neumann suggested utilizing Logistic map as a random number generator in 1947, a great number of encryption schemes based on Logistic map and/or its variants have been proposed. This paper re-evaluates the security of an image cipher based
Cheng, Ge +4 more
core +1 more source
Cryptanalysis Knapsack Cipher Using Artificial Immune System [PDF]
In this work, the use of an artificial immune system (AIS ) in cryptanalysis is explored. This AIS uses the clonal selection principle for the cryptanalysis of knapsack cipher.
Eman Al-Obaidy
doaj +1 more source
NBC is a family of block ciphers using Generalized Feistel structure, designed by Xu Hong et al. There are three block and key sizes,i.e.,128/128, 128/256 and 256/256. A 16-bit Sbox is involved in the cipher as the non-linear component.
Yang Jiangshuai +3 more
doaj +1 more source
An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards
With the recent proliferation of distributed systems and networking, remote authentication has become a crucial task in many networking applications. Various schemes have been proposed so far for the two-party remote authentication; however, some of them
Hong, Choong Seon, Pathan, Al-Sakib Khan
core +1 more source
FPGA Realization of a Novel Hyperchaos Augmented Image Encryption Algorithm
With the rapid growth of multimedia communication, protecting image data has become increasingly critical. This article proposes a novel 3‐stage hyperchaos‐based augmented image encryption technique (3SHAIET) that utilizes a three‐stage process with chaotic systems of increasing dimensionality (e.g., six‐dimensional [6D], 8D, and 9D) to enhance ...
Wassim Alexan +6 more
wiley +1 more source
Software system of cryptanalysis using impossible differentials method based on parallel programming technologies OpenMP and MPI [PDF]
Програма, яка розробляється в даному проекті, призначена для проведення криптоаналізу методом неможливих диференціалів блокового симетричного шифру AES, а саме – над елементами раунду.The program is being developed in this project is designed for ...
Novak, Nazarii +1 more
core
Recent proposals by Mahmood et al., Braeken et al., and Chaudhry et al. aimed at establishing secure communication in AMI, asserting their methods fulfil the requisite security criteria. This paper, however, reveals that each of these proposals exhibits security vulnerabilities and lacks sufficient features for deployment.
Ahmad Rahdari, Bahareh Akhbari
wiley +1 more source

