Results 31 to 40 of about 33,779 (275)

Cryptanalysis of a Chaotic Image Encryption Algorithm Based on Information Entropy [PDF]

open access: yesIEEE Access, 2018
Recently, a chaotic image encryption algorithm based on information entropy (IEAIE) was proposed. This paper scrutinizes the security properties of the algorithm and evaluates the validity of the used quantifiable security metrics.
Chengqing Li   +4 more
semanticscholar   +1 more source

Security Analysis of Lightweight IoT Cipher: Chaskey

open access: yesCryptography, 2020
This paper presents the differential cryptanalysis of ARX based cipher Chaskey using tree search based heuristic approach. ARX algorithms are suitable for resource-constrained devices such as IoT and very resistant to standard cryptanalysis such as ...
Ashutosh Dhar Dwivedi
doaj   +1 more source

Deciphering a novel image cipher based on mixed transformed Logistic maps [PDF]

open access: yes, 2015
Since John von Neumann suggested utilizing Logistic map as a random number generator in 1947, a great number of encryption schemes based on Logistic map and/or its variants have been proposed. This paper re-evaluates the security of an image cipher based
Cheng, Ge   +4 more
core   +1 more source

Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2017
This paper serves as a systematization of knowledge of linear cryptanalysis and provides novel insights in the areas of key schedule design and tweakable block ciphers.
Thorsten Kranz   +2 more
doaj   +1 more source

Quantum differential cryptanalysis to the block ciphers

open access: yes, 2015
Differential cryptanalysis is one of the most popular methods in attacking block ciphers. However, there still some limitations in traditional differential cryptanalysis.
Li, Hong-Wei, Yang, Li
core   +1 more source

Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock [PDF]

open access: yes, 2013
LBlock is a lightweight block cipher proposed in ACNS 2011. It has a 64-bit block size and 80-bit key size which is the typical parameter setting accepted by most of the recent proposed lightweight block ciphers. It has fast hardware implementation efficiency and it still remains rather secure considering the recent results and the security margin it ...
Chen, Jiageng, Miyaji, Atsuko
openaire   +2 more sources

Cryptanalysis of NBC-128

open access: yesDianzi Jishu Yingyong, 2021
NBC is a family of block ciphers using Generalized Feistel structure, designed by Xu Hong et al. There are three block and key sizes,i.e.,128/128, 128/256 and 256/256. A 16-bit Sbox is involved in the cipher as the non-linear component.
Yang Jiangshuai   +3 more
doaj   +1 more source

Wave-Shaped Round Functions and Primitive Groups [PDF]

open access: yes, 2018
Round functions used as building blocks for iterated block ciphers, both in the case of Substitution-Permutation Networks and Feistel Networks, are often obtained as the composition of different layers which provide confusion and diffusion, and key ...
Aragona, Riccardo   +4 more
core   +2 more sources

Cryptanalysis Knapsack Cipher Using Artificial Immune System [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2009
In this work, the use of an artificial immune system (AIS ) in  cryptanalysis  is explored. This AIS uses the clonal selection principle for the cryptanalysis of knapsack cipher.
Eman Al-Obaidy
doaj   +1 more source

An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards

open access: yes, 2007
With the recent proliferation of distributed systems and networking, remote authentication has become a crucial task in many networking applications. Various schemes have been proposed so far for the two-party remote authentication; however, some of them
Hong, Choong Seon, Pathan, Al-Sakib Khan
core   +1 more source

Home - About - Disclaimer - Privacy