Results 21 to 30 of about 1,838 (257)
The paper presents a general framework for improving the security of the cryptosystem based on the symmetric block cipher. The main idea is based on possibility of chancing substitution boxes (called S-boxes) in encryption/decryption algorithm. In order
Piotr Mroczkowski
doaj +1 more source
Algebraic Fault Attack Against SIMECK Cipher Based on Optimized Fault Location [PDF]
This paper proposes a algebraic fault attack method based on optimized fault location against SIMECK cipher.By analyzing encryption diffusion defect of the SIMECK round function and the failure cause,the deterministic propagation characteristics of ...
HUANG Changyang, WANG Tao, WANG Xiaohan, CHEN Qingchao, YIN Shizhuang
doaj +1 more source
The next-generation Internet of Things (IoT) will control the critical infrastructure of the 21st century, including the Smart Power Grid and Smart Cities.
Ted H. Szymanski
doaj +1 more source
A Bit Shift Image Encryption Algorithm Based on Double Chaotic Systems
A chaotic system refers to a deterministic system with seemingly random irregular motion, and its behavior is uncertain, unrepeatable, and unpredictable.
Yue Zhao, Lingfeng Liu
doaj +1 more source
Decryption of Deterministic Phase-Encoded Digital Holography Using Convolutional Neural Networks
Digital holographic encryption is an important information security technology. Traditional encryption techniques require the use of keys to encrypt information.
Huang-Tian Chan, Chi-Ching Chang
doaj +1 more source
RSA algoritam i njegova praktična primena / RSA algorithm
RSA algoritam jeste algoritam sa javnim ključem koji uključuje tri koraka: generisanje ključa, enkripciju i dekripciju. RSA enkripciona šema je determinističaka što znači da se osnovni tekst uvek enkriptuje u isti šifrovani tekst za unapred zadati javni ...
Sonja R. Kuljanski
doaj +1 more source
A Probabilistic Chaotic Image Encryption Scheme
This paper proposes a probabilistic image encryption scheme that improves on existing deterministic schemes by using a chaining mode of chaotic maps in a permutation-masking process.
Ali Kanso +2 more
doaj +1 more source
An Effective Encrypted Scheme Over Outsourcing Data for Query on Cloud Platform
With the proliferation of cloud platforms, users are inclined to outsource their encrypted data to cloud platforms. However, the existing encryption schemes only provide users with limited query types over encrypted data.
Jianchao Tang, Shaojing Fu, Ming Xu
doaj +1 more source
Deterministic and Efficiently Searchable Encryption [PDF]
We present as-strong-as-possible definitions of privacy, and constructions achieving them, for public-key encryption schemes where the encryption algorithm is deterministic. We obtain as a consequence database encryption methods that permit fast (i.e. sub-linear, and in fact logarithmic, time) search while provably providing privacy that is as strong ...
Mihir Bellare +2 more
openaire +1 more source
A New Image Encryption Algorithm Based on Single S-Box and Dynamic Encryption Step
Chaotic-based S-box image encryption schemes promise to be a practical solution for securing digital images. However, the high-dimensional continuous chaotic has increased the algorithm’s complexity.
Wang Ji Jun, Tan Soo Fun
doaj +1 more source

