Results 81 to 90 of about 33,779 (275)

Security analysis of an encryption scheme based on nonpositional polynomial notations

open access: yesOpen Engineering, 2016
The aim of the research was to conduct a cryptographic analysis of an encryption scheme developed on the basis of nonpositional polynomial notations to estimate the algorithm strength. Nonpositional polynomial notations (NPNs) are residue number systems (
Kapalova Nursulu   +1 more
doaj   +1 more source

Cryptanalysis of LOKI 91

open access: yesDAIMI Report Series, 1993
In this paper we examine the redesign of LOKI, LOKI91 proposed by Brown et al. First it is shown that there is no characteristic with a probability high enough to do a successful differential attack on LOKI91. Secondly we show that the size of the image of the F-function in LOKI91 is 8\22*2^32.
openaire   +2 more sources

Detailed Assessment of Hardware Implementations, Attacks and Countermeasures for the Ascon Authenticated Cipher

open access: yesElectronics Letters, Volume 61, Issue 1, January/December 2025.
ASCON has been selected by the National Institute of Standards and Technology (NIST) as the new authenticated cipher for lightweight environments. This paper analyses ASCON's hardware (HW) security through its HW implementation schemes, successful HW attacks and the proposed HW countermeasures against them, aiming to serve as a starting point for ...
Miguel Martín‐González   +3 more
wiley   +1 more source

Subspace Trail Cryptanalysis and its Applications to AES

open access: yesIACR Transactions on Symmetric Cryptology, 2017
We introduce subspace trail cryptanalysis, a generalization of invariant subspace cryptanalysis. With this more generic treatment of subspaces we do no longer rely on specific choices of round constants or subkeys, and the resulting method is as such a ...
Lorenzo Grassi   +2 more
semanticscholar   +1 more source

Lightweight Encryption for Raw‐Format Live Video Streaming Over Automotive Ethernet

open access: yesElectronics Letters, Volume 61, Issue 1, January/December 2025.
The proposed lightweight encryption scheme is implemented using GStreamer pipeline elements to provide secure raw‐format live video streaming over automotive Ethernet. In order to derive an optimal trade‐off between encryption robustness and low CPU overhead under limited CPU resources, the confidentiality of the proposed scheme is evaluated through ...
Kyungmin Go, Seungkwang Lee
wiley   +1 more source

Quantifying Shannon's Work Function for Cryptanalytic Attacks

open access: yes, 2010
Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures.
van Son, R. J. J. H.
core   +1 more source

A DNA‐Dynamic Permutation‐Diffusion Algorithm for Image Encryption Using Scaling Chaotification Models and Advanced DNA Operations

open access: yesIET Image Processing, Volume 19, Issue 1, January/December 2025.
This paper proposes a DNA‐Dynamic Concurrent Permutation‐Diffusion Algorithm (DNA‐DCP‐DA) for secure image encryption, employing novel scaling chaotification models and advanced noncommutative DNA operations to address weaknesses in existing systems.
Mustafa Kamil Khairullah   +5 more
wiley   +1 more source

Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM

open access: yesCryptography, 2019
In this work, we focus on LS-design ciphers Fantomas, Robin, and iSCREAM. LS-designs are a family of bitslice ciphers aimed at efficient masked implementations against side-channel analysis.
Ashutosh Dhar Dwivedi   +3 more
doaj   +1 more source

Cryptanalyzing and Improving a Novel Color Image Encryption Algorithm Using RT-Enhanced Chaotic Tent Maps

open access: yesIEEE Access, 2018
In recent years, chaos-based image encryption algorithms have aroused extensive research interest. However, some image encryption algorithms still have several security defects, and the research on cryptanalysis is relatively inadequate.
Congxu Zhu, Kehui Sun
doaj   +1 more source

EVALUATION OF CRYPTOGRAPHIC ALGORITHMS [PDF]

open access: yes
This article represents a synthesis of the evaluation methods for cryptographic algorithms and of their efficiency within practical applications. It approaches also the main operations carried out in cryptanalysis and the main categories and methods of ...
Emil Simion, Mircea Andraşiu
core  

Home - About - Disclaimer - Privacy