Results 61 to 70 of about 6,520 (191)
On the Derivative Imbalance and Ambiguity of Functions
In 2007, Carlet and Ding introduced two parameters, denoted by $Nb_F$ and $NB_F$, quantifying respectively the balancedness of general functions $F$ between finite Abelian groups and the (global) balancedness of their derivatives $D_a F(x)=F(x+a)-F(x)$, $
Carlet, Claude +3 more
core +2 more sources
This work presents a secure telemedicine cryptosystem based on a novel 4D memristive chaotic oscillator and a Dispatched Gray Code Scrambler (DGCS). Implemented on FPGA, the system ensures power‐efficient encryption, making it suitable for real‐time medical image transmission in IoT healthcare environments.
Fritz Nguemo Kemdoum +3 more
wiley +1 more source
Cryptanalysis of Reduced-Round SPECK
SPECK, a family of lightweight block ciphers proposed by the National Security Agency (NSA), is widely used under resource constrained environment. There are many cryptanalytic results on SPECK concentrated on differential and linear attacks.
Jiongjiong Ren, Shaozhen Chen
doaj +1 more source
Security evaluation, NPCR + UACI results of 99.5978% and 33.4549% respectively, confirm the system is secure against statistical and differential attacks. Besides, the FPGA implementation achieves low power of 115 mW at a speed of 42.56 MHz. This makes it suitable for IoT applications where power and hardware resources are constrained. ABSTRACT In this
Fritz Nguemo Kemdoum +4 more
wiley +1 more source
Related-Key Differential Attacks on COSB-128
COSB-128 (Moldovyan et al., 2002) is a block cipher with 128-bit and 256-bit secret keys, which use key and data-dependent operational substitutions in fast controllable permutation blocks (CPB) concept.
Song Dat Phuc Tran, Changhoon Lee
doaj +1 more source
ABSTRACT Background and Aims Despite their widespread use, randomized clinical trials (RCTs) face challenges like differential loss to follow‐up, which can impact validity. Real‐world evidence (RWE) from real‐world data (RWD) is increasingly used to address these limitations, but RCTs and RWE have provided complementary, disconnected observations of ...
Michael Batech +7 more
wiley +1 more source
Security against differential and linear cryptanalysis for general SPT models
To use SP network in stream ciphers safely and efficiently,the ability against differential and linear cryptanalysis of SPT models was studied,where S and T denote different layers for substitution,in which compression could be achieved,and P denotes the
Feng-mei LIU +4 more
doaj +2 more sources
Automated Risk‐Based Cryptoperiod Calculation in ICSs: Analytical Framework and Software Tool
ABSTRACT Internal network and system reconnaissance is one of the first crucial stages of most cyber attacks, though it plays an especially important role in attacks on complex industrial control systems (ICSs) that span both IT and OT environments. Frequently, besides device enumeration and scanning, a malicious ICS reconnaissance campaign will also ...
Gabriele Cianfarani +2 more
wiley +1 more source
Generating Graphs Packed with Paths Estimation of Linear Approximations and Differentials
When designing a new symmetric-key primitive, the designer must show resistance to known attacks. Perhaps most prominent amongst these are linear and differential cryptanalysis. However, it is notoriously difficult to accurately demonstrate e.g.
Mathias Hall-Andersen, Philip S. Vejre
doaj +1 more source
Generic Quantum‐Safe IIoT Forensics Framework (QS‐IIoT‐F) ABSTRACT The continuous evolution of quantum computing has shown novel and transformative possibilities and critical implications for the Industrial Internet of Things (IIoT) forensic processes.
Victor R. Kebande
wiley +1 more source

