Results 61 to 70 of about 6,566 (183)
Highly dispersive substitution box (S‐box) design using chaos
Highly dispersive S‐boxes are desirable in cryptosystems as nonlinear confusion sub‐layers for resisting modern attacks. For a near optimal cryptosystem resistant to modern cryptanalysis, a highly nonlinear and low differential probability (DP) value is ...
Zaid Bin Faheem +4 more
doaj +1 more source
Further Results of the Cryptographic Properties on the Butterfly Structures
Recently, a new structure called butterfly introduced by Perrin et at. is attractive for that it has very good cryptographic properties: the differential uniformity is at most equal to 4 and algebraic degree is also very high when exponent $e=3$.
Feng, Xiutao, Fu, Shihui
core +1 more source
A Generalization of Gaussian Balancing and Gaussian Balancing‐Lucas Numbers With Applications
In this paper, we study a generalization of Gaussian balancing and Gaussian Lucas‐balancing numbers, we find their generating functions, Binet formulas, related matrix representation, and many other properties. Also, we provide some applications in cryptography.
T. Al-Asoully +2 more
wiley +1 more source
Related-Key Differential Attacks on COSB-128
COSB-128 (Moldovyan et al., 2002) is a block cipher with 128-bit and 256-bit secret keys, which use key and data-dependent operational substitutions in fast controllable permutation blocks (CPB) concept.
Song Dat Phuc Tran, Changhoon Lee
doaj +1 more source
The Internet of Medical Things (IoMT) in the IoT with Cloud Healthcare (CHI) creates a high volume of real‐time medical data, but traditional compression methods suffer high computation costs, privacy leaks and quantum attacks, while advanced cryptographic algorithms such as homomorphic encryption are costly and have poor scalability for the real‐time ...
Rajasekaran P. +5 more
wiley +1 more source
Security against differential and linear cryptanalysis for general SPT models
To use SP network in stream ciphers safely and efficiently,the ability against differential and linear cryptanalysis of SPT models was studied,where S and T denote different layers for substitution,in which compression could be achieved,and P denotes the
Feng-mei LIU +4 more
doaj +2 more sources
A connection between cryptography and polynomial functions is extremely significant. Mathematical performance of polynomials helps to enhance the cryptographic primitives, which are trustworthy as well as straightforward representation tools, in everyday use. In this research, explicit topological sequences Qf which correspond to degree‐based, distance‐
Mohammad Mazyad Hazzazi +5 more
wiley +1 more source
Generating Graphs Packed with Paths Estimation of Linear Approximations and Differentials
When designing a new symmetric-key primitive, the designer must show resistance to known attacks. Perhaps most prominent amongst these are linear and differential cryptanalysis. However, it is notoriously difficult to accurately demonstrate e.g.
Mathias Hall-Andersen, Philip S. Vejre
doaj +1 more source
A Secure and Robust Blockchain‐Based Medical Image Encryption Approach Using Lorenz Chaotic System
Keeping medical images confidential while transmitting is crucial, especially in an open networking environment. One effective approach is blockchain‐based encryption, which provides strong security for sensitive healthcare data. To ensure the greatest levels of medical data integrity and authenticity, our proposed scheme employs a unique Lorenz ...
Fahima Hajjej +4 more
wiley +1 more source
Probability distributions of correlation and differentials in block ciphers
We study the probability distributions of difference propagation probabilities and input-output correlations for functions and block ciphers of given dimensions, for several of them for the first time.
Daemen Joan, Rijmen Vincent
doaj +1 more source

