Results 1 to 10 of about 11,196 (120)

On Known-Plaintext Attacks to a Compressed Sensing-based Encryption: A Quantitative Analysis [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, 2015
Despite the linearity of its encoding, compressed sensing may be used to provide a limited form of data protection when random encoding matrices are used to produce sets of low-dimensional measurements (ciphertexts).
Cambareri, Valerio   +4 more
core   +4 more sources

Adaptive Color Image Encryption Scheme Based on Multiple Distinct Chaotic Maps and DNA Computing

open access: yesMathematics, 2022
In this paper, we propose an adaptive encryption scheme for color images using Multiple Distinct Chaotic Maps (MDCM) and DNA computing. We have chosen three distinct chaotic maps, including a 2D-Henon map, a Tent map, and a Logistic map, to separately ...
Shaista Mansoor   +5 more
doaj   +1 more source

Improved Parameter Estimates for Correlation and Capacity Deviates in Linear Cryptanalysis

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Statistical attacks form an important class of attacks against block ciphers. By analyzing the distribution of the statistics involved in the attack, cryptanalysts aim at providing a good estimate of the data complexity of the attack.
Céline Blondeau, Kaisa Nyberg
doaj   +1 more source

Cryptanalysis of a chaotic block cipher with external key and its improved version [PDF]

open access: yes, 2006
Recently, Pareek et al. proposed a symmetric key block cipher using multiple one-dimensional chaotic maps. This paper reports some new findings on the security problems of this kind of chaotic cipher: 1) a number of weak keys exists; 2) some important ...
Alvarez   +12 more
core   +2 more sources

PPDC: A Privacy-Preserving Distinct Counting Scheme for Mobile Sensing

open access: yesApplied Sciences, 2019
Mobile sensing mines group information through sensing and aggregating users’ data. Among major mobile sensing applications, the distinct counting problem aiming to find the number of distinct elements in a data stream with repeated elements, is ...
Xiaochen Yang   +3 more
doaj   +1 more source

Enabling Confidentiality in Content-Based Publish/Subscribe Infrastructures [PDF]

open access: yes, 2006
Content-Based Publish/Subscribe (CBPS) is an interaction model where the interests of subscribers are stored in a content-based forwarding infrastructure to guide routing of notifications to interested parties.
Raiciu, C, Rosenblum, DS
core   +1 more source

Quantitative Evaluation of Chaotic CBC Mode of Operation [PDF]

open access: yes, 2016
The cipher block chaining (CBC) block cipher mode of operation presents a very popular way of encrypting which is used in various applications. In previous research work, we have mathematically proven that, under some conditions, this mode of operation ...
Abidi, Abdessalem   +4 more
core   +3 more sources

Cryptanalysis of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables [PDF]

open access: yes, 2007
This paper studies the security of a recently-proposed MPEG-video encryption scheme based on secret Huffman tables. Our cryptanalysis shows that: 1) the key space of the encryption scheme is not sufficiently large against divide-and-conquer (DAC) attack ...
A. Uhl   +10 more
core   +3 more sources

Review on DNA Cryptography [PDF]

open access: yes, 2019
Cryptography is the science that secures data and communication over the network by applying mathematics and logic to design strong encryption methods.
Mondal, Mandrita, Ray, Kumar S.
core   +3 more sources

Revisiting Shared Data Protection Against Key Exposure

open access: yes, 2020
This paper puts a new light on secure data storage inside distributed systems. Specifically, it revisits computational secret sharing in a situation where the encryption key is exposed to an attacker.
Bertoni Guido   +7 more
core   +3 more sources

Home - About - Disclaimer - Privacy