Results 51 to 60 of about 8,822 (201)

Distribution of the best nonzero differential and linear approximations of s-box functions

open access: yesJournal of Telecommunications and Information Technology, 2006
In the paper the differential and the linear approximations of two classes of s-box functions are considered. The classes are the permutations and arbitrary functions with n binary inputs and m binary outputs, where 1≤n=m≤10.
Krzysztof Chmiel
doaj   +1 more source

Dynamic MDS Matrices for Substantial Cryptographic Strength [PDF]

open access: yes, 2011
Ciphers get their strength from the mathematical functions of confusion and diffusion, also known as substitution and permutation. These were the basics of classical cryptography and they are still the basic part of modern ciphers.
Malik, Muhammad Yasir, No, Jong-Seon
core   +2 more sources

Quantum‐Resistant Security in Digital Twin Healthcare Systems

open access: yesIET Wireless Sensor Systems, Volume 16, Issue 1, January/December 2026.
Quantum‐safe architecture for secure healthcare data transmission integrating QKD, edge devices, and cloud‐based Digital Twin analytics. ABSTRACT The development of digital twin (DT) systems for healthcare presents several challenges, particularly in ensuring data protection and communication security in real‐time environments.
Ahmed K. Jameil, Hamed Al‐Raweshidy
wiley   +1 more source

Linear and differential cryptanalysis: Another viewpoint

open access: yesМатематические вопросы криптографии, 2020
Доказаны теоремы о точных значениях линейной и разностной характеристик. Приведен пример универсальной функциональной схемы, который показывает, что обычные методы оценки характеристик вероятностных соотношений могут приводить к значительным ошибкам.
Malyshev, F. M., Trishin, A. E.
openaire   +3 more sources

Safe and Quickest Medical Image Encryption Using Logistic Map Derived S‐Boxes and Galois Field

open access: yesComputational and Mathematical Methods, Volume 2026, Issue 1, 2026.
The pseudorandomness, simplicity of use, and extreme sensitivity to even the slightest change in the initial value and handling parameters make chaotic maps attractive. The use of medical imaging to diagnose illnesses has grown in significance. These photographs need strong security measures because they are exchanged over public networks.
Mahwish Bano   +5 more
wiley   +1 more source

Improved machine learning-aided linear cryptanalysis: application to DES

open access: yesCybersecurity
In CRYPTO 2019, Gohr built a bridge between machine learning and differential cryptanalysis, which show that machine learning-aided methods have advantages over classical differential cryptanalysis.
Zezhou Hou   +2 more
doaj   +1 more source

Error Function Attack of chaos synchronization based encryption schemes

open access: yes, 2003
Different chaos synchronization based encryption schemes are reviewed and compared from the practical point of view. As an efficient cryptanalysis tool for chaos encryption, a proposal based on the Error Function Attack is presented systematically and ...
Hu, Gang   +3 more
core   +1 more source

A Generalization of Gaussian Balancing and Gaussian Balancing‐Lucas Numbers With Applications

open access: yesInternational Journal of Mathematics and Mathematical Sciences, Volume 2026, Issue 1, 2026.
In this paper, we study a generalization of Gaussian balancing and Gaussian Lucas‐balancing numbers, we find their generating functions, Binet formulas, related matrix representation, and many other properties. Also, we provide some applications in cryptography.
T. Al-Asoully   +2 more
wiley   +1 more source

On the Derivative Imbalance and Ambiguity of Functions

open access: yes, 2018
In 2007, Carlet and Ding introduced two parameters, denoted by $Nb_F$ and $NB_F$, quantifying respectively the balancedness of general functions $F$ between finite Abelian groups and the (global) balancedness of their derivatives $D_a F(x)=F(x+a)-F(x)$, $
Carlet, Claude   +3 more
core   +2 more sources

Quantum‐Enhanced Zero‐Knowledge Compression Used for Cloud IoT Healthcare: A Scalable, Privacy‐Preserving QZ‐HCN Framework

open access: yesInternational Journal of Intelligent Systems, Volume 2026, Issue 1, 2026.
The Internet of Medical Things (IoMT) in the IoT with Cloud Healthcare (CHI) creates a high volume of real‐time medical data, but traditional compression methods suffer high computation costs, privacy leaks and quantum attacks, while advanced cryptographic algorithms such as homomorphic encryption are costly and have poor scalability for the real‐time ...
Rajasekaran P.   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy