Results 81 to 90 of about 2,248,235 (257)

Performance analysis of energy efficient improved LEACH protocol in IoT networks

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
Abstract The Internet of Things incorporates embedded technologies, wireless sensor networks, control and automation technologies, and wearable devices to enable integrated buildings, enterprises, intelligent homes, and wearable devices. Because sensor nodes have limited power, the energy consumption of the Internet of Things network is critical.
Surbhi Bhatia   +3 more
wiley   +1 more source

Algebraic and Higher-Order Differential Cryptanalysis of Pyjamask-96

open access: yesIACR Transactions on Symmetric Cryptology, 2020
Cryptographic competitions, like the ongoing NIST call for lightweight cryptography, always provide a thriving research environment, where new interesting ideas are proposed and new cryptographic insights are made. One proposal for this NIST call that is
Christoph Dobraunig   +2 more
semanticscholar   +1 more source

Bit-Based Evaluation of Lightweight Block Ciphers SLIM, LBC-IoT, and SLA by Mixed Integer Linear Programming

open access: yesIET Information Security
Many lightweight block ciphers have been proposed for IoT devices that have limited resources. SLIM, LBC-IoT, and SLA are lightweight block ciphers developed for IoT systems.
Nobuyuki Sugio
doaj   +1 more source

Towards Analysable Chaos-based Cryptosystems: Constructing Difference Distribution Tables for Chaotic Maps

open access: yesJournal of Informatics and Web Engineering
Chaos-based cryptography has yet to achieve practical, real-world applications despite extensive research. A major challenge is the difficulty in analysing the security of these cryptosystems, which often appear ad hoc in design.
Je Sen Teh, Abubakar Abba
doaj   +1 more source

Detailed Assessment of Hardware Implementations, Attacks and Countermeasures for the Ascon Authenticated Cipher

open access: yesElectronics Letters, Volume 61, Issue 1, January/December 2025.
ASCON has been selected by the National Institute of Standards and Technology (NIST) as the new authenticated cipher for lightweight environments. This paper analyses ASCON's hardware (HW) security through its HW implementation schemes, successful HW attacks and the proposed HW countermeasures against them, aiming to serve as a starting point for ...
Miguel Martín‐González   +3 more
wiley   +1 more source

SITM: See-In-The-Middle Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers

open access: yesIACR Trans. Cryptogr. Hardw. Embed. Syst., 2019
Side-channel analysis constitutes a powerful attack vector against cryptographic implementations. Techniques such as power and electromagnetic side-channel analysis have been extensively studied to provide an efficient way to recover the secret key used ...
S. Bhasin   +5 more
semanticscholar   +1 more source

Enhancing Differential-Linear Cryptanalysis [PDF]

open access: yes, 2002
Differential cryptanalysis analyzes ciphers by studying the development of differences during encryption. Linear cryptanalysis is similar but is based on studying approximate linear relations. In 1994, Langford and Hellman showed that both kinds of analysis can be combined together by a technique called differential-linear cryptanalysis, in which the ...
Eli Biham, Orr Dunkelman, Nathan Keller
openaire   +1 more source

Lightweight Encryption for Raw‐Format Live Video Streaming Over Automotive Ethernet

open access: yesElectronics Letters, Volume 61, Issue 1, January/December 2025.
The proposed lightweight encryption scheme is implemented using GStreamer pipeline elements to provide secure raw‐format live video streaming over automotive Ethernet. In order to derive an optimal trade‐off between encryption robustness and low CPU overhead under limited CPU resources, the confidentiality of the proposed scheme is evaluated through ...
Kyungmin Go, Seungkwang Lee
wiley   +1 more source

On the Derivative Imbalance and Ambiguity of Functions

open access: yes, 2018
In 2007, Carlet and Ding introduced two parameters, denoted by $Nb_F$ and $NB_F$, quantifying respectively the balancedness of general functions $F$ between finite Abelian groups and the (global) balancedness of their derivatives $D_a F(x)=F(x+a)-F(x)$, $
Carlet, Claude   +3 more
core   +2 more sources

Security analysis of an encryption scheme based on nonpositional polynomial notations

open access: yesOpen Engineering, 2016
The aim of the research was to conduct a cryptographic analysis of an encryption scheme developed on the basis of nonpositional polynomial notations to estimate the algorithm strength. Nonpositional polynomial notations (NPNs) are residue number systems (
Kapalova Nursulu   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy