Results 71 to 80 of about 6,566 (183)

Hardware Design for Secure Telemedicine Using A Novel Framework, A New 4D Memristive Chaotic Oscillator, and Dispatched Gray Code Scrambler

open access: yesEngineering Reports, Volume 7, Issue 10, October 2025.
This work presents a secure telemedicine cryptosystem based on a novel 4D memristive chaotic oscillator and a Dispatched Gray Code Scrambler (DGCS). Implemented on FPGA, the system ensures power‐efficient encryption, making it suitable for real‐time medical image transmission in IoT healthcare environments.
Fritz Nguemo Kemdoum   +3 more
wiley   +1 more source

On relationship between differential/linear clustering effects and the number of active S-boxes in block ciphers

open access: yesCybersecurity
Differential cryptanalysis and linear cryptanalysis are the two best-known cryptanalysis techniques for symmetric-key primitives. Ensuring resistance to these attacks is critical for the security of block ciphers.
Ting Peng, Wentao Zhang, Jingsui Weng
doaj   +1 more source

On the Embedded of a Fast, Light and Robust Chaos‐Based Cryptosystem in NEXYS4 FPGA Card for Real Time Color Image Security (CBC in N‐FPGA‐RTCIP)

open access: yesEngineering Reports, Volume 7, Issue 9, September 2025.
Security evaluation, NPCR + UACI results of 99.5978% and 33.4549% respectively, confirm the system is secure against statistical and differential attacks. Besides, the FPGA implementation achieves low power of 115 mW at a speed of 42.56 MHz. This makes it suitable for IoT applications where power and hardware resources are constrained. ABSTRACT In this
Fritz Nguemo Kemdoum   +4 more
wiley   +1 more source

MILP-Based Differential Cryptanalysis on Round-Reduced Midori64

open access: yesIEEE Access, 2020
Mixed integer linear programming (MILP) model was presented by Sun et al. at Asiacrypt 2014 to search for differential characteristics of block ciphers. Based on this model, it is easy to assess block ciphers against differential attack.
Hongluan Zhao   +3 more
doaj   +1 more source

Algebraic properties of generalized Rijndael-like ciphers [PDF]

open access: yes, 2012
We provide conditions under which the set of Rijndael functions considered as permutations of the state space and based on operations of the finite field $\GF (p^k)$ ($p\geq 2$ a prime number) is not closed under functional composition.
B. Scott   +5 more
core  

Combining Real‐World and Clinical Trial Data Through Privacy‐Preserving Record Linkage: Opportunities and Challenges—A Narrative Review

open access: yesHealth Science Reports, Volume 8, Issue 9, September 2025.
ABSTRACT Background and Aims Despite their widespread use, randomized clinical trials (RCTs) face challenges like differential loss to follow‐up, which can impact validity. Real‐world evidence (RWE) from real‐world data (RWD) is increasingly used to address these limitations, but RCTs and RWE have provided complementary, disconnected observations of ...
Michael Batech   +7 more
wiley   +1 more source

XSL Block Ciphers’ Key-schedules with Resistance to Differential Cryptanalysis

open access: yesБезопасность информационных технологий, 2014
The paper discusses the resistance of XSL block ciphers to differential cryptanalysis. AES-like block ciphers with alternative key-schedules (increased performance and density) are given as an example.
Marina Aleksandrovna Pudovkina   +1 more
doaj  

Distinguishing Attack on NORX Permutation

open access: yesIACR Transactions on Symmetric Cryptology, 2018
NORX is a permutation-based authentication scheme which is currently a third-round candidate of the ongoing CAESAR competition. The security bound of NORX is derived from the sponge construction applied to an ideal underlying permutation.
Tao Huang, Hongjun Wu
doaj   +1 more source

Analysing Relations involving small number of Monomials in AES S- Box [PDF]

open access: yes, 2017
In the present day, AES is one the most widely used and most secure Encryption Systems prevailing. So, naturally lots of research work is going on to mount a significant attack on AES.
Ghosal, Riddhi
core   +1 more source

Automated Risk‐Based Cryptoperiod Calculation in ICSs: Analytical Framework and Software Tool

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 5, September/October 2025.
ABSTRACT Internal network and system reconnaissance is one of the first crucial stages of most cyber attacks, though it plays an especially important role in attacks on complex industrial control systems (ICSs) that span both IT and OT environments. Frequently, besides device enumeration and scanning, a malicious ICS reconnaissance campaign will also ...
Gabriele Cianfarani   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy