Results 51 to 60 of about 26,855 (196)

Enhancing E‐Commerce Security Based on Involution Function Using Twin Key AES Cipher

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
In the realm of surging e‐commerce data and increasing digital transactions, ensuring end‐to‐end security is paramount to protect sensitive information and maintain user trust. The Advanced Encryption Standard (AES), a cornerstone of network security, relies on symmetric key encryption for secure communication.
Biresh Kumar   +11 more
wiley   +1 more source

Higher-Order Differential-Linear Cryptanalysis of ChaCha Stream Cipher

open access: yesIEEE Access
This paper studies the advanced methodologies of differential cryptanalysis with a particular emphasis on higher-order differentials and higher-order differential-linear cryptanalysis, along with their application to the ChaCha stream cipher.
Nasratullah Ghafoori, Atsuko Miyaji
doaj   +1 more source

Quantum Resistant Random Linear Code Based Public Key Encryption Scheme RLCE [PDF]

open access: yes, 2015
Lattice based encryption schemes and linear code based encryption schemes have received extensive attention in recent years since they have been considered as post-quantum candidate encryption schemes.
Wang, Yongge
core   +2 more sources

Enhancement of Secrecy of Block Ciphered Systems by Deliberate Noise

open access: yes, 2012
This paper considers the problem of end-end security enhancement by resorting to deliberate noise injected in ciphertexts. The main goal is to generate a degraded wiretap channel in application layer over which Wyner-type secrecy encoding is invoked to ...
Khiabani, Yahya S.   +3 more
core   +1 more source

(Not Surprising) Attacks on Recent Pairing‐Free Attribute‐Based Encryption Schemes

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
The fact that designing secure and efficient identity or attribute‐based encryption (ABE) schemes requires the use of specific algebraic tools like bilinear pairings or lattices is well known in the cryptographic community. However, some journals whose main topics are not cryptographic still publish papers proposing, for instance, ABE schemes in ...
Javier Herranz, Thomas Haines
wiley   +1 more source

Improvement of the Minimal‐Guess‐Basis MILP Model and Its Application to ESF

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
The guess‐and‐determine technique find wide applications in the recovery of unknown variables within given system of relations. The fundamental concept behind this technique involves guessing certain unknown variables and deducing the remaining ones based on the relational system.
Lingchen Li   +5 more
wiley   +1 more source

Replication of ciphertext in cryptographic system

open access: yesJournal of Applied Sciences and Environmental Management, 2018
Eavesdroppers are constantly trying to reveal encrypted messages sent within communication channels. The motive to illegally decrypt ciphertexts (encrypted messages) could be for economical, security or political reasons.
E.O. Osaghae
doaj   +1 more source

Revisiting the Security of the Lightweight Stream Cipher Draco: New Observation and TMDTO Attacks

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
Draco is a lightweight small‐state stream cipher proposed in 2022. It is designed to provide a 128‐bit security level and be provably secure against time‐memory‐data trade‐off (TMDTO) attacks. In this paper, we revisit the security of Draco against TMDTO attacks.
Ziyu Guan   +5 more
wiley   +1 more source

Impossible 4-Tuple Attack: A New Mixture-Based Cryptanalysis Applied to Reduced-Round AES-128

open access: yesIEEE Access
Mixture differential cryptanalysis is a powerful technique for evaluating the robustness of Substitution-Permutation Network (SPN)-structured block ciphers, including the Advanced Encryption Standard (AES).
Masroor Hajari   +4 more
doaj   +1 more source

Breaking an image encryption algorithm based on chaos

open access: yes, 2011
Recently, a chaos-based image encryption algorithm called MCKBA (Modified Chaotic-Key Based Algorithm) was proposed. This paper analyzes the security of MCKBA and finds that it can be broken with a differential attack, which requires only four chosen ...
Arroyo D.   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy