Results 61 to 70 of about 2,411 (231)
Improved machine learning-aided linear cryptanalysis: application to DES
In CRYPTO 2019, Gohr built a bridge between machine learning and differential cryptanalysis, which show that machine learning-aided methods have advantages over classical differential cryptanalysis.
Zezhou Hou +2 more
doaj +1 more source
Automated Risk‐Based Cryptoperiod Calculation in ICSs: Analytical Framework and Software Tool
ABSTRACT Internal network and system reconnaissance is one of the first crucial stages of most cyber attacks, though it plays an especially important role in attacks on complex industrial control systems (ICSs) that span both IT and OT environments. Frequently, besides device enumeration and scanning, a malicious ICS reconnaissance campaign will also ...
Gabriele Cianfarani +2 more
wiley +1 more source
Generic Quantum‐Safe IIoT Forensics Framework (QS‐IIoT‐F) ABSTRACT The continuous evolution of quantum computing has shown novel and transformative possibilities and critical implications for the Industrial Internet of Things (IIoT) forensic processes.
Victor R. Kebande
wiley +1 more source
Analysis of the cryptographic strength of the SHA-256 hash function using the SAT approach
Cryptographic hash functions play a significant role in modern information security systems by ensuring data integrity and enabling efficient data compression. One of the most important and widely used cryptographic hash functions is SHA-256 that belongs
V. V. Davydov +3 more
doaj +1 more source
Hardware Security in the Connected World
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee +4 more
wiley +1 more source
ABSTRACT With the increasing reliance on the Internet of Things devices in various fields, especially in smart homes or smart factories, concerns are increasing about cyber threats targeting intrusion detection systems that protect Internet of Things (IoT) networks.
Zaed S. Mahdi +2 more
wiley +1 more source
Many lightweight block ciphers have been proposed for IoT devices that have limited resources. SLIM, LBC-IoT, and SLA are lightweight block ciphers developed for IoT systems.
Nobuyuki Sugio
doaj +1 more source
Impossible differential cryptanalysis of Saturnin algorithm
A lightweight block cipher, Saturnin, is an AES-like algorithm.In a resource-constrained environment, Saturnin can also provide high security.The impossible differential analysis on Saturnin was proposed.First, based on the structure of Saturnin, the ...
Zilong JIANG, Chenhui JIN
doaj +2 more sources
Abstract This paper introduces a novel lightweight colour image encryption algorithm, specifically designed for resource‐constrained environments such as Internet of Things (IoT) devices. As IoT systems become increasingly prevalent, secure and efficient data transmission becomes crucial.
Kenan İnce, Cemile İnce, Davut Hanbay
wiley +1 more source
Chaos-based cryptography has yet to achieve practical, real-world applications despite extensive research. A major challenge is the difficulty in analysing the security of these cryptosystems, which often appear ad hoc in design.
Je Sen Teh, Abubakar Abba
doaj +1 more source

