Results 81 to 90 of about 2,411 (231)
Performance analysis of energy efficient improved LEACH protocol in IoT networks
Abstract The Internet of Things incorporates embedded technologies, wireless sensor networks, control and automation technologies, and wearable devices to enable integrated buildings, enterprises, intelligent homes, and wearable devices. Because sensor nodes have limited power, the energy consumption of the Internet of Things network is critical.
Surbhi Bhatia +3 more
wiley +1 more source
Impossible 4-Tuple Attack: A New Mixture-Based Cryptanalysis Applied to Reduced-Round AES-128
Mixture differential cryptanalysis is a powerful technique for evaluating the robustness of Substitution-Permutation Network (SPN)-structured block ciphers, including the Advanced Encryption Standard (AES).
Masroor Hajari +4 more
doaj +1 more source
Impossible Differential Cryptanalysis of Surge
Abstract In 2018, Li Lang et al. proposed a new lightweight block cipher which is called Surge. Its block size is 64-bit, and the length of key size is 64/80/128-bit, respectively. They also proved that the cipher has good performance on security and effectively resists on differential attack, linear attack and algebraic attack.
Zhiqiang Qu, Xuan Shen, Jun He
openaire +1 more source
Mix-Basis Geometric Approach to Boomerang Distinguishers
Differential cryptanalysis relies on assumptions like Markov ciphers and hypothesis of stochastic equivalence. The probability of a differential characteristic estimated by classical methods is the key-averaged probability under the two assumptions ...
Chengcheng Chang +4 more
doaj +1 more source
Improved Differential Cryptanalysis of SPEEDY
SPEEDY is a family of lightweight block ciphers designed by Leander et al. Several differential attacks have been reported on the SPEEDY variants. However, nearly all of these attacks are based on differential characteristics with probabilities that ...
Tim Beyne, Addie Neyt
doaj +1 more source
New Results in Reduced Round AES - 256 Impossible Differential Cryptanalysis [PDF]
K.B. Jithendra, T. K. Shahana, Fred Lacy
openalex +1 more source
Differential Cryptanalysis of Nimbus [PDF]
Nimbus is a block cipher submitted as a candidate to the NESSIE project by Alexis Machado. Like many other ciphers Nimbus combines multiplication operations with XOR operations, a common technique to protect against various kinds of cryptanalysis.In this paper we present two new differential properties of multiplication operations with probability ...
openaire +1 more source
Differential Cryptanalysis on Chaotic Based Image Encryption Scheme
Image encryption schemes based on chaotic maps and systems have been investigated for more than one decade. However, many proposed schemes that obtained good score in the statistical tests, i.e.
K. Wong, W. Yap, B. Goi, D. C. Wong
semanticscholar +1 more source
Differential experiments using parallel alternative operations
The use of alternative operations in differential cryptanalysis, or alternative notions of differentials, is lately receiving increasing attention. Recently, Civino et al.
Calderini Marco +2 more
doaj +1 more source
Impossible Differential Cryptanalysis of Zodiac [PDF]
We discuss the impossible differential cryptanalysis of the blockcipher Zodiac. The main design principles of Zodiac are simplicity and efficiency. However the diffusion layer in its round function is too simple to offer enough security. An impossible differential cryptanalysis is a proper method to attack the weakness of Zodiac.
Deukjo Hong +4 more
openaire +1 more source

