Results 61 to 70 of about 6,566 (183)

Highly dispersive substitution box (S‐box) design using chaos

open access: yesETRI Journal, 2020
Highly dispersive S‐boxes are desirable in cryptosystems as nonlinear confusion sub‐layers for resisting modern attacks. For a near optimal cryptosystem resistant to modern cryptanalysis, a highly nonlinear and low differential probability (DP) value is ...
Zaid Bin Faheem   +4 more
doaj   +1 more source

Further Results of the Cryptographic Properties on the Butterfly Structures

open access: yes, 2016
Recently, a new structure called butterfly introduced by Perrin et at. is attractive for that it has very good cryptographic properties: the differential uniformity is at most equal to 4 and algebraic degree is also very high when exponent $e=3$.
Feng, Xiutao, Fu, Shihui
core   +1 more source

A Generalization of Gaussian Balancing and Gaussian Balancing‐Lucas Numbers With Applications

open access: yesInternational Journal of Mathematics and Mathematical Sciences, Volume 2026, Issue 1, 2026.
In this paper, we study a generalization of Gaussian balancing and Gaussian Lucas‐balancing numbers, we find their generating functions, Binet formulas, related matrix representation, and many other properties. Also, we provide some applications in cryptography.
T. Al-Asoully   +2 more
wiley   +1 more source

Related-Key Differential Attacks on COSB-128

open access: yesInternational Journal of Distributed Sensor Networks, 2015
COSB-128 (Moldovyan et al., 2002) is a block cipher with 128-bit and 256-bit secret keys, which use key and data-dependent operational substitutions in fast controllable permutation blocks (CPB) concept.
Song Dat Phuc Tran, Changhoon Lee
doaj   +1 more source

Quantum‐Enhanced Zero‐Knowledge Compression Used for Cloud IoT Healthcare: A Scalable, Privacy‐Preserving QZ‐HCN Framework

open access: yesInternational Journal of Intelligent Systems, Volume 2026, Issue 1, 2026.
The Internet of Medical Things (IoMT) in the IoT with Cloud Healthcare (CHI) creates a high volume of real‐time medical data, but traditional compression methods suffer high computation costs, privacy leaks and quantum attacks, while advanced cryptographic algorithms such as homomorphic encryption are costly and have poor scalability for the real‐time ...
Rajasekaran P.   +5 more
wiley   +1 more source

Security against differential and linear cryptanalysis for general SPT models

open access: yesTongxin xuebao, 2012
To use SP network in stream ciphers safely and efficiently,the ability against differential and linear cryptanalysis of SPT models was studied,where S and T denote different layers for substitution,in which compression could be achieved,and P denotes the
Feng-mei LIU   +4 more
doaj   +2 more sources

Polynomial Representations of Weak Inverse Property Quasigroups and Their Role in Cryptographic Primitives

open access: yesJournal of Mathematics, Volume 2026, Issue 1, 2026.
A connection between cryptography and polynomial functions is extremely significant. Mathematical performance of polynomials helps to enhance the cryptographic primitives, which are trustworthy as well as straightforward representation tools, in everyday use. In this research, explicit topological sequences Qf which correspond to degree‐based, distance‐
Mohammad Mazyad Hazzazi   +5 more
wiley   +1 more source

Generating Graphs Packed with Paths Estimation of Linear Approximations and Differentials

open access: yesIACR Transactions on Symmetric Cryptology, 2018
When designing a new symmetric-key primitive, the designer must show resistance to known attacks. Perhaps most prominent amongst these are linear and differential cryptanalysis. However, it is notoriously difficult to accurately demonstrate e.g.
Mathias Hall-Andersen, Philip S. Vejre
doaj   +1 more source

A Secure and Robust Blockchain‐Based Medical Image Encryption Approach Using Lorenz Chaotic System

open access: yesJournal of Sensors, Volume 2026, Issue 1, 2026.
Keeping medical images confidential while transmitting is crucial, especially in an open networking environment. One effective approach is blockchain‐based encryption, which provides strong security for sensitive healthcare data. To ensure the greatest levels of medical data integrity and authenticity, our proposed scheme employs a unique Lorenz ...
Fahima Hajjej   +4 more
wiley   +1 more source

Probability distributions of correlation and differentials in block ciphers

open access: yesJournal of Mathematical Cryptology, 2007
We study the probability distributions of difference propagation probabilities and input-output correlations for functions and block ciphers of given dimensions, for several of them for the first time.
Daemen Joan, Rijmen Vincent
doaj   +1 more source

Home - About - Disclaimer - Privacy