Results 51 to 60 of about 8,822 (201)
Distribution of the best nonzero differential and linear approximations of s-box functions
In the paper the differential and the linear approximations of two classes of s-box functions are considered. The classes are the permutations and arbitrary functions with n binary inputs and m binary outputs, where 1≤n=m≤10.
Krzysztof Chmiel
doaj +1 more source
Dynamic MDS Matrices for Substantial Cryptographic Strength [PDF]
Ciphers get their strength from the mathematical functions of confusion and diffusion, also known as substitution and permutation. These were the basics of classical cryptography and they are still the basic part of modern ciphers.
Malik, Muhammad Yasir, No, Jong-Seon
core +2 more sources
Quantum‐Resistant Security in Digital Twin Healthcare Systems
Quantum‐safe architecture for secure healthcare data transmission integrating QKD, edge devices, and cloud‐based Digital Twin analytics. ABSTRACT The development of digital twin (DT) systems for healthcare presents several challenges, particularly in ensuring data protection and communication security in real‐time environments.
Ahmed K. Jameil, Hamed Al‐Raweshidy
wiley +1 more source
Linear and differential cryptanalysis: Another viewpoint
Доказаны теоремы о точных значениях линейной и разностной характеристик. Приведен пример универсальной функциональной схемы, который показывает, что обычные методы оценки характеристик вероятностных соотношений могут приводить к значительным ошибкам.
Malyshev, F. M., Trishin, A. E.
openaire +3 more sources
Safe and Quickest Medical Image Encryption Using Logistic Map Derived S‐Boxes and Galois Field
The pseudorandomness, simplicity of use, and extreme sensitivity to even the slightest change in the initial value and handling parameters make chaotic maps attractive. The use of medical imaging to diagnose illnesses has grown in significance. These photographs need strong security measures because they are exchanged over public networks.
Mahwish Bano +5 more
wiley +1 more source
Improved machine learning-aided linear cryptanalysis: application to DES
In CRYPTO 2019, Gohr built a bridge between machine learning and differential cryptanalysis, which show that machine learning-aided methods have advantages over classical differential cryptanalysis.
Zezhou Hou +2 more
doaj +1 more source
Error Function Attack of chaos synchronization based encryption schemes
Different chaos synchronization based encryption schemes are reviewed and compared from the practical point of view. As an efficient cryptanalysis tool for chaos encryption, a proposal based on the Error Function Attack is presented systematically and ...
Hu, Gang +3 more
core +1 more source
A Generalization of Gaussian Balancing and Gaussian Balancing‐Lucas Numbers With Applications
In this paper, we study a generalization of Gaussian balancing and Gaussian Lucas‐balancing numbers, we find their generating functions, Binet formulas, related matrix representation, and many other properties. Also, we provide some applications in cryptography.
T. Al-Asoully +2 more
wiley +1 more source
On the Derivative Imbalance and Ambiguity of Functions
In 2007, Carlet and Ding introduced two parameters, denoted by $Nb_F$ and $NB_F$, quantifying respectively the balancedness of general functions $F$ between finite Abelian groups and the (global) balancedness of their derivatives $D_a F(x)=F(x+a)-F(x)$, $
Carlet, Claude +3 more
core +2 more sources
The Internet of Medical Things (IoMT) in the IoT with Cloud Healthcare (CHI) creates a high volume of real‐time medical data, but traditional compression methods suffer high computation costs, privacy leaks and quantum attacks, while advanced cryptographic algorithms such as homomorphic encryption are costly and have poor scalability for the real‐time ...
Rajasekaran P. +5 more
wiley +1 more source

