On Known-Plaintext Attacks to a Compressed Sensing-based Encryption: A Quantitative Analysis [PDF]
Despite the linearity of its encoding, compressed sensing may be used to provide a limited form of data protection when random encoding matrices are used to produce sets of low-dimensional measurements (ciphertexts).
Cambareri, Valerio +4 more
core +4 more sources
Adaptive Color Image Encryption Scheme Based on Multiple Distinct Chaotic Maps and DNA Computing
In this paper, we propose an adaptive encryption scheme for color images using Multiple Distinct Chaotic Maps (MDCM) and DNA computing. We have chosen three distinct chaotic maps, including a 2D-Henon map, a Tent map, and a Logistic map, to separately ...
Shaista Mansoor +5 more
doaj +1 more source
Improved Parameter Estimates for Correlation and Capacity Deviates in Linear Cryptanalysis
Statistical attacks form an important class of attacks against block ciphers. By analyzing the distribution of the statistics involved in the attack, cryptanalysts aim at providing a good estimate of the data complexity of the attack.
Céline Blondeau, Kaisa Nyberg
doaj +1 more source
Cryptanalysis of a chaotic block cipher with external key and its improved version [PDF]
Recently, Pareek et al. proposed a symmetric key block cipher using multiple one-dimensional chaotic maps. This paper reports some new findings on the security problems of this kind of chaotic cipher: 1) a number of weak keys exists; 2) some important ...
Alvarez +12 more
core +2 more sources
PPDC: A Privacy-Preserving Distinct Counting Scheme for Mobile Sensing
Mobile sensing mines group information through sensing and aggregating users’ data. Among major mobile sensing applications, the distinct counting problem aiming to find the number of distinct elements in a data stream with repeated elements, is ...
Xiaochen Yang +3 more
doaj +1 more source
Enabling Confidentiality in Content-Based Publish/Subscribe Infrastructures [PDF]
Content-Based Publish/Subscribe (CBPS) is an interaction model where the interests of subscribers are stored in a content-based forwarding infrastructure to guide routing of notifications to interested parties.
Raiciu, C, Rosenblum, DS
core +1 more source
Quantitative Evaluation of Chaotic CBC Mode of Operation [PDF]
The cipher block chaining (CBC) block cipher mode of operation presents a very popular way of encrypting which is used in various applications. In previous research work, we have mathematically proven that, under some conditions, this mode of operation ...
Abidi, Abdessalem +4 more
core +3 more sources
Cryptanalysis of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables [PDF]
This paper studies the security of a recently-proposed MPEG-video encryption scheme based on secret Huffman tables. Our cryptanalysis shows that: 1) the key space of the encryption scheme is not sufficiently large against divide-and-conquer (DAC) attack ...
A. Uhl +10 more
core +3 more sources
Review on DNA Cryptography [PDF]
Cryptography is the science that secures data and communication over the network by applying mathematics and logic to design strong encryption methods.
Mondal, Mandrita, Ray, Kumar S.
core +3 more sources
Revisiting Shared Data Protection Against Key Exposure
This paper puts a new light on secure data storage inside distributed systems. Specifically, it revisits computational secret sharing in a situation where the encryption key is exposed to an attacker.
Bertoni Guido +7 more
core +3 more sources

