Results 41 to 50 of about 26,855 (196)

Pairing‐Free Certificateless Searchable Public Key Encryption Scheme Resistant to Frequency Analysis for IIOT

open access: yesIET Communications, Volume 20, Issue 1, January/December 2026.
This paper proposes a novel lightweight certificateless public key authentication with keyword search (CPAEKS) scheme tailored for IIoT environments, effectively addressing data confidentiality and retrieval efficiency. The scheme resists frequency analysis attacks, removes reliance on bilinear pairings, and eliminates key escrow and certificate ...
Kaiqi Liu   +3 more
wiley   +1 more source

Lightweight Cryptanalysis of IoT Encryption Algorithms: Is Quota Sampling the Answer?

open access: yesIEEE Access
Rapid growth in the number of small sensor devices known as the Internet of Things (IoT) has seen the development of lightweight encryption algorithms. Two well-known lightweight algorithms are SIMON and SIMECK which have been specifically designed for ...
Jonathan Cook   +2 more
doaj   +1 more source

Multidimensional Zero-Correlation Linear Cryptanalysis of the Block Cipher KASUMI [PDF]

open access: yes, 2014
The block cipher KASUMI is widely used for security in many synchronous wireless standards. It was proposed by ETSI SAGE for usage in 3GPP (3rd Generation Partnership Project) ciphering algorthms in 2001.
Chen, Shaozhen, Yi, Wentan
core  

SKE2SG: A Secure Key Establishment Scheme for Smart Grid Cyber‐Physical Systems Based on Elliptic Curve Cryptography

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 11, Issue 1, January/December 2026.
Recent proposals by Mahmood et al., Braeken et al., and Chaudhry et al. aimed at establishing secure communication in AMI, asserting their methods fulfil the requisite security criteria. This paper, however, reveals that each of these proposals exhibits security vulnerabilities and lacks sufficient features for deployment.
Ahmad Rahdari, Bahareh Akhbari
wiley   +1 more source

Survey on approaches of stream cipher cryptanalysis

open access: yesTongxin xuebao, 2022
Cryptanalysis plays an essential role in the design of ciphers algorithm.Based on this, the common approaches were reviewed and investigated to clarify their relations.These approaches were categorized into four classes according to their main techniques,
Zhaocun ZHOU, Dengguo FENG
doaj   +2 more sources

Machine learning-aided differential-linear attacks with applications to Des and Speck32/64

open access: yesJournal of King Saud University: Computer and Information Sciences
In CRYPTO 2019, Gohr introduced machine learning-aided differential cryptanalysis, demonstrating superior performance in key-recovery attacks compared to traditional methods. This advancement has sparked significant interest in exploring the potential of
Ze-zhou Hou   +2 more
doaj   +1 more source

Hyperchaos‐Driven 3D RGB Image Scrambling and Encryption for Multi‐Image Security

open access: yesIET Image Processing, Volume 20, Issue 1, January/December 2026.
The proposed encryption scheme scrambles N colour images by stacking them into a three‐dimensional red, green, blue image, generating a secure 256‐bit key using SHA‐256 and a user‐provided salt, and applying a five‐dimensional multi‐wing hyperchaotic system to produce random key streams.
Muhammad Hanif   +6 more
wiley   +1 more source

An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards

open access: yes, 2007
With the recent proliferation of distributed systems and networking, remote authentication has become a crucial task in many networking applications. Various schemes have been proposed so far for the two-party remote authentication; however, some of them
Hong, Choong Seon, Pathan, Al-Sakib Khan
core   +1 more source

A Novel Hybrid Image Encryption Scheme Using Henon Map for Secure Image Communication

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
The combination of chaos theory and cryptographic methodologies constitutes a pivotal aspect of the information security. Owing to certain attributes of images, like their large data capacity and significant redundancy, image encryption needs specialized techniques instead of conventional text encryption.
Saba Inam   +6 more
wiley   +1 more source

Automated Classical Cipher Emulation Attacks via Unified Unsupervised Generative Adversarial Networks

open access: yesCryptography, 2023
Cryptanalysis has been studied and gradually improved with the evolution of cryptosystems over past decades. Recently, deep learning (DL) has started to be used in cryptanalysis to attack digital cryptosystems. As computing power keeps growing, deploying
Seonghwan Park, Hyunil Kim, Inkyu Moon
doaj   +1 more source

Home - About - Disclaimer - Privacy