Results 81 to 90 of about 2,411 (231)

Performance analysis of energy efficient improved LEACH protocol in IoT networks

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
Abstract The Internet of Things incorporates embedded technologies, wireless sensor networks, control and automation technologies, and wearable devices to enable integrated buildings, enterprises, intelligent homes, and wearable devices. Because sensor nodes have limited power, the energy consumption of the Internet of Things network is critical.
Surbhi Bhatia   +3 more
wiley   +1 more source

Impossible 4-Tuple Attack: A New Mixture-Based Cryptanalysis Applied to Reduced-Round AES-128

open access: yesIEEE Access
Mixture differential cryptanalysis is a powerful technique for evaluating the robustness of Substitution-Permutation Network (SPN)-structured block ciphers, including the Advanced Encryption Standard (AES).
Masroor Hajari   +4 more
doaj   +1 more source

Impossible Differential Cryptanalysis of Surge

open access: yesIOP Conference Series: Earth and Environmental Science, 2020
Abstract In 2018, Li Lang et al. proposed a new lightweight block cipher which is called Surge. Its block size is 64-bit, and the length of key size is 64/80/128-bit, respectively. They also proved that the cipher has good performance on security and effectively resists on differential attack, linear attack and algebraic attack.
Zhiqiang Qu, Xuan Shen, Jun He
openaire   +1 more source

Mix-Basis Geometric Approach to Boomerang Distinguishers

open access: yesIACR Transactions on Symmetric Cryptology
Differential cryptanalysis relies on assumptions like Markov ciphers and hypothesis of stochastic equivalence. The probability of a differential characteristic estimated by classical methods is the key-averaged probability under the two assumptions ...
Chengcheng Chang   +4 more
doaj   +1 more source

Improved Differential Cryptanalysis of SPEEDY

open access: yesIACR Transactions on Symmetric Cryptology
SPEEDY is a family of lightweight block ciphers designed by Leander et al. Several differential attacks have been reported on the SPEEDY variants. However, nearly all of these attacks are based on differential characteristics with probabilities that ...
Tim Beyne, Addie Neyt
doaj   +1 more source

Differential Cryptanalysis of Nimbus [PDF]

open access: yes, 2002
Nimbus is a block cipher submitted as a candidate to the NESSIE project by Alexis Machado. Like many other ciphers Nimbus combines multiplication operations with XOR operations, a common technique to protect against various kinds of cryptanalysis.In this paper we present two new differential properties of multiplication operations with probability ...
openaire   +1 more source

Differential Cryptanalysis on Chaotic Based Image Encryption Scheme

open access: yesIOP Conference Series: Materials Science and Engineering, 2019
Image encryption schemes based on chaotic maps and systems have been investigated for more than one decade. However, many proposed schemes that obtained good score in the statistical tests, i.e.
K. Wong, W. Yap, B. Goi, D. C. Wong
semanticscholar   +1 more source

Differential experiments using parallel alternative operations

open access: yesJournal of Mathematical Cryptology
The use of alternative operations in differential cryptanalysis, or alternative notions of differentials, is lately receiving increasing attention. Recently, Civino et al.
Calderini Marco   +2 more
doaj   +1 more source

Impossible Differential Cryptanalysis of Zodiac [PDF]

open access: yes, 2002
We discuss the impossible differential cryptanalysis of the blockcipher Zodiac. The main design principles of Zodiac are simplicity and efficiency. However the diffusion layer in its round function is too simple to offer enough security. An impossible differential cryptanalysis is a proper method to attack the weakness of Zodiac.
Deukjo Hong   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy