Results 71 to 80 of about 26,855 (196)
This work presents a secure telemedicine cryptosystem based on a novel 4D memristive chaotic oscillator and a Dispatched Gray Code Scrambler (DGCS). Implemented on FPGA, the system ensures power‐efficient encryption, making it suitable for real‐time medical image transmission in IoT healthcare environments.
Fritz Nguemo Kemdoum +3 more
wiley +1 more source
Security evaluation, NPCR + UACI results of 99.5978% and 33.4549% respectively, confirm the system is secure against statistical and differential attacks. Besides, the FPGA implementation achieves low power of 115 mW at a speed of 42.56 MHz. This makes it suitable for IoT applications where power and hardware resources are constrained. ABSTRACT In this
Fritz Nguemo Kemdoum +4 more
wiley +1 more source
ABSTRACT Background and Aims Despite their widespread use, randomized clinical trials (RCTs) face challenges like differential loss to follow‐up, which can impact validity. Real‐world evidence (RWE) from real‐world data (RWD) is increasingly used to address these limitations, but RCTs and RWE have provided complementary, disconnected observations of ...
Michael Batech +7 more
wiley +1 more source
Secrecy in the American Revolution
This paper analyzes how the use of various cryptographic and cryptanalytic techniques affected the American Revolution. By examining specific instances of and each country\u27s general approaches to cryptography and cryptanalysis, it is determined that ...
Minzer, Abigail N.
core
Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM
In this work, we focus on LS-design ciphers Fantomas, Robin, and iSCREAM. LS-designs are a family of bitslice ciphers aimed at efficient masked implementations against side-channel analysis.
Ashutosh Dhar Dwivedi +3 more
doaj +1 more source
In recent years, chaos-based image encryption algorithms have aroused extensive research interest. However, some image encryption algorithms still have several security defects, and the research on cryptanalysis is relatively inadequate.
Congxu Zhu, Kehui Sun
doaj +1 more source
On Cryptographic Attacks Using Backdoors for SAT
Propositional satisfiability (SAT) is at the nucleus of state-of-the-art approaches to a variety of computationally hard problems, one of which is cryptanalysis.
Ignatiev, Alexey +4 more
core +1 more source
Standard differential cryptanalysis uses statistical dependencies between the difference of two plaintexts and the difference of the respective two ciphertexts to attack a cipher. Here we introduce polytopic cryptanalysis which considers interdependencies between larger sets of texts as they traverse through the cipher. We prove that the methodology of
openaire +3 more sources
Influence of Non-Linearity on Selected Cryptographic Criteria of 8x8 S-Boxes
The article defines standard criteria used to characterize the cryptographic quality of the S box: regularity, non linearity, autocorrelation, avalanche and immunity against differential cryptanalysis.
Petr Tesař
doaj +1 more source
Cryptanalysis of 2R− Schemes [PDF]
In this paper, we study the security of 2R− schemes [17,18], which are the “minus variant” of two-round schemes. This variant consists in removing some of the n polynomials of the public key, and permits to thwart an attack described at Crypto'99 [25] against two-round schemes.
Faugère, Jean-Charles, Perret, Ludovic
openaire +2 more sources

