Results 41 to 50 of about 6,566 (183)
Recent proposals by Mahmood et al., Braeken et al., and Chaudhry et al. aimed at establishing secure communication in AMI, asserting their methods fulfil the requisite security criteria. This paper, however, reveals that each of these proposals exhibits security vulnerabilities and lacks sufficient features for deployment.
Ahmad Rahdari, Bahareh Akhbari
wiley +1 more source
This paper proposes a secure electrocardiogram (ECG)‐processing framework that digitises ECG waveforms from clinical paper or image‐based records and encrypts them using a dual chaotic cryptographic scheme. The method supports both extracted and native digital signals, ensuring strong security and interoperability for Internet of Medical Things ...
Nader Mahmoud, Shymaa S. Shaban
wiley +1 more source
Hyperchaos‐Driven 3D RGB Image Scrambling and Encryption for Multi‐Image Security
The proposed encryption scheme scrambles N colour images by stacking them into a three‐dimensional red, green, blue image, generating a secure 256‐bit key using SHA‐256 and a user‐provided salt, and applying a five‐dimensional multi‐wing hyperchaotic system to produce random key streams.
Muhammad Hanif +6 more
wiley +1 more source
Improved machine learning-aided linear cryptanalysis: application to DES
In CRYPTO 2019, Gohr built a bridge between machine learning and differential cryptanalysis, which show that machine learning-aided methods have advantages over classical differential cryptanalysis.
Zezhou Hou +2 more
doaj +1 more source
Improved meet-in-the-middle attacks on reduced-round tweakable block ciphers Kiasu-BC and Deoxys-BC
Tweakable block ciphers Kiasu-BC and Deoxys-BC are both the internal block ciphers of the candidates for the CAESAR authenticated encryption competition.
Zhangjun Ma, Manman Li, Shaozhen Chen
doaj +1 more source
Enhancement of Secrecy of Block Ciphered Systems by Deliberate Noise
This paper considers the problem of end-end security enhancement by resorting to deliberate noise injected in ciphertexts. The main goal is to generate a degraded wiretap channel in application layer over which Wyner-type secrecy encoding is invoked to ...
Khiabani, Yahya S. +3 more
core +1 more source
A Novel Hybrid Image Encryption Scheme Using Henon Map for Secure Image Communication
The combination of chaos theory and cryptographic methodologies constitutes a pivotal aspect of the information security. Owing to certain attributes of images, like their large data capacity and significant redundancy, image encryption needs specialized techniques instead of conventional text encryption.
Saba Inam +6 more
wiley +1 more source
Regular subgroups with large intersection
In this paper we study the relationships between the elementary abelian regular subgroups and the Sylow $2$-subgroups of their normalisers in the symmetric group $\mathrm{Sym}(\mathbb{F}_2^n)$, in view of the interest that they have recently raised for ...
Aragona, Riccardo +3 more
core +1 more source
Enhancing E‐Commerce Security Based on Involution Function Using Twin Key AES Cipher
In the realm of surging e‐commerce data and increasing digital transactions, ensuring end‐to‐end security is paramount to protect sensitive information and maintain user trust. The Advanced Encryption Standard (AES), a cornerstone of network security, relies on symmetric key encryption for secure communication.
Biresh Kumar +11 more
wiley +1 more source
Error Function Attack of chaos synchronization based encryption schemes
Different chaos synchronization based encryption schemes are reviewed and compared from the practical point of view. As an efficient cryptanalysis tool for chaos encryption, a proposal based on the Error Function Attack is presented systematically and ...
Hu, Gang +3 more
core +1 more source

