Results 71 to 80 of about 33,779 (275)

Random Strip Peeling: A novel lightweight image encryption for IoT devices based on colour planes permutation

open access: yesCAAI Transactions on Intelligence Technology, Volume 10, Issue 2, Page 529-544, April 2025.
Abstract This paper introduces a novel lightweight colour image encryption algorithm, specifically designed for resource‐constrained environments such as Internet of Things (IoT) devices. As IoT systems become increasingly prevalent, secure and efficient data transmission becomes crucial.
Kenan İnce, Cemile İnce, Davut Hanbay
wiley   +1 more source

Mem‐Transistor‐Based Gaussian Error–Generating Hardware for Post‐Quantum Cryptography Applications

open access: yesAdvanced Quantum Technologies, Volume 8, Issue 3, March 2025.
The demonstration of a Gaussian error sampler system that leverages the intrinsic stochastic characteristics of mem‐transistor semiconductor devices. The demonstrated Gaussian error sampler significantly reduces computational and memory overhead compared to existing techniques.
Moon‐Seok Kim   +3 more
wiley   +1 more source

Development and investigation of parallel model of bee colony algorithms for cryptanalysis problem solving

open access: yesAdvanced Engineering Research, 2017
Introduction. The research area of “natural calculation” is now widely used for the solution to optimization NP-complete problems including combinatorial tasks of cryptanalysis.
Yury O Chernyshev   +3 more
doaj   +1 more source

CRYPTO-MINE: Cryptanalysis via Mutual Information Neural Estimation [PDF]

open access: green, 2023
Benjamin D. Kim   +6 more
openalex   +1 more source

A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications

open access: yesEngineering Reports, Volume 7, Issue 1, January 2025.
A novel image encryption algorithm has been developed to impart security to the digital color images. ABSTRACT The rapid proliferation of Internet of Things (IoT) devices has underscored the critical need to safeguard the data they store and transmit.
Muhammad Aqeel   +6 more
wiley   +1 more source

Division Cryptanalysis of Block Ciphers with a Binary Diffusion Layer

open access: yesIACR Cryptology ePrint Archive, 2019
In this study, the authors propose an accurate approach to model the propagation of the division property of linear layers by the smallest amount of inequalities.
Wenying Zhang, V. Rijmen
semanticscholar   +1 more source

Challenges in Modelling Analog PUFs: A Study of Hybrid and Diode Triode Current Mirror Inverter PUF Under Machine Learning Attacks

open access: yesIET Circuits, Devices &Systems, Volume 2025, Issue 1, 2025.
Physically unclonable function‐based authentication is one of the widely accepted and promising hardware security primitives. For security applications, strong PUF circuits can generate a large number of challenge–response pairs (CRPs) for authentication.
Gisha Chittattukara Girijan   +5 more
wiley   +1 more source

Cryptanalysis of random-phase-encoding-based optical cryptosystem via deep learning.

open access: yesOptics Express, 2019
Random Phase Encoding (RPE) techniques for image encryption have drawn increasing attention during the past decades. We demonstrate in this contribution that the RPE-based optical cryptosystems are vulnerable to the chosen-plaintext attack (CPA) with ...
Han Hai   +5 more
semanticscholar   +1 more source

Performance analysis of energy efficient improved LEACH protocol in IoT networks

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
Abstract The Internet of Things incorporates embedded technologies, wireless sensor networks, control and automation technologies, and wearable devices to enable integrated buildings, enterprises, intelligent homes, and wearable devices. Because sensor nodes have limited power, the energy consumption of the Internet of Things network is critical.
Surbhi Bhatia   +3 more
wiley   +1 more source

Mixture Differential Cryptanalysis: a New Approach to Distinguishers and Attacks on round-reduced AES

open access: yesIACR Transactions on Symmetric Cryptology, 2018
At Eurocrypt 2017 the first secret-key distinguisher for 5-round AES - based on the “multiple-of-8” property - has been presented. Although it allows to distinguish a random permutation from an AES-like one, it seems rather hard to implement a key ...
Lorenzo Grassi
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy