Results 71 to 80 of about 30,889 (254)

Green IoT: Energy Efficiency, Renewable Integration, and Security Implications

open access: yesIET Networks, Volume 14, Issue 1, January/December 2025.
This paper surveys energy management strategies in IoT, emphasising energy harvesting and saving techniques to reduce energy consumption and extend network lifespan. It explores renewable energy integration to lower carbon footprints and improve device efficiency, while addressing security vulnerabilities in energy management practices.
Mohammed Qasim Alazzawi   +3 more
wiley   +1 more source

Higher-Order Differential-Linear Cryptanalysis of ChaCha Stream Cipher

open access: yesIEEE Access
This paper studies the advanced methodologies of differential cryptanalysis with a particular emphasis on higher-order differentials and higher-order differential-linear cryptanalysis, along with their application to the ChaCha stream cipher.
Nasratullah Ghafoori, Atsuko Miyaji
doaj   +1 more source

Multidimensional Zero-Correlation Linear Cryptanalysis of the Block Cipher KASUMI [PDF]

open access: yes, 2014
The block cipher KASUMI is widely used for security in many synchronous wireless standards. It was proposed by ETSI SAGE for usage in 3GPP (3rd Generation Partnership Project) ciphering algorthms in 2001.
Chen, Shaozhen, Yi, Wentan
core  

A robust approach to satellite image encryption using chaotic map and circulant matrices

open access: yesEngineering Reports, Volume 6, Issue 12, December 2024.
The graphical abstract depicts an advanced image encryption technique utilizing hyperbolic tangent tent maps and Hill cipher substitution. The process ensures robust security by integrating XOR operations and Kronecker expansion to transform a plain image into its encrypted counterpart using carefully crafted secret keys.
Shamsa Kanwal   +6 more
wiley   +1 more source

Cryptanalysis of 2R− Schemes [PDF]

open access: yes, 2006
In this paper, we study the security of 2R− schemes [17,18], which are the “minus variant” of two-round schemes. This variant consists in removing some of the n polynomials of the public key, and permits to thwart an attack described at Crypto'99 [25] against two-round schemes.
Faugère, Jean-Charles, Perret, Ludovic
openaire   +4 more sources

Algebraic side‐channel attacks on Trivium stream cipher

open access: yesIET Communications, Volume 18, Issue 19, Page 1335-1347, December 2024.
In this paper, the authors show that the first Algebraic Side‐Channel Attacks on Trivium are implemented both in ASIC under Hamming distance leakage model and in microcontrollers of different buses under Hamming weight leakage model. Abstract Algebraic Side‐Channel Attacks (ASCAs), first proposed by Renauld and Standaert in 2009, are a potent ...
Wenlong Sun, Jie Guan
wiley   +1 more source

Cryptanalysis of the CFVZ cryptosystem

open access: yesAdvances in Mathematics of Communications, 2007
The paper analyzes a new public key cryptosystem whose security is based on a matrix version of the discrete logarithm problem over an elliptic curve. It is shown that the complexity of solving the underlying problem for the proposed system is dominated by the complexity of solving a fixed number of discrete logarithm problems in the group of an ...
Climent, J J, Gorla, E, Rosenthal, J
openaire   +4 more sources

Cryptanalysis of the “Kindle” Cipher [PDF]

open access: yes, 2013
In this paper we study a 128-bit-key cipher called PC1 which is used as part of the DRM system of the Amazon Kindle e-book reader. This is the first academic cryptanalysis of this cipher and it shows that PC1 is a very weak stream cipher, and can be practically broken in a known-plaintext and even in a ciphertext-only scenario.
Biryukov, Alex   +2 more
openaire   +2 more sources

Cryptanalysis and Improvements on Some Graph-based Authentication Schemes [PDF]

open access: yescryptanalysis and improvements on some graph-based authentication schemes (2012) 7, 2012
In 2010, Grigoriev and Shpilrain, introduced some graph-based authentication schemes. We present a cryptanalysis of some of these protocols, and introduce some new schemes to fix the problems.
arxiv  

A literature review on V2X communications security: Foundation, solutions, status, and future

open access: yesIET Communications, Volume 18, Issue 20, Page 1683-1715, December 2024.
The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV ...
Zuobin Ying   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy