Results 11 to 20 of about 461 (143)
An efficient deep learning model for brain tumour detection with privacy preservation
Abstract Internet of medical things (IoMT) is becoming more prevalent in healthcare applications as a result of current AI advancements, helping to improve our quality of life and ensure a sustainable health system. IoMT systems with cutting‐edge scientific capabilities are capable of detecting, transmitting, learning and reasoning.
Mujeeb Ur Rehman +8 more
wiley +1 more source
Constructing Two Classes of Boolean Functions With Good Cryptographic Properties
Wu et al. proposed a generalized Tu-Deng conjecture over $\mathbb {F}_{2^{rm}}\times {\mathbb {F}_{2^{m}}}$ , and constructed Boolean functions with good properties. However the proof of the generalized conjecture is still open.
Yindong Chen +3 more
doaj +1 more source
More Balanced Boolean Functions With Optimal Algebraic Immunity and Good Nonlinearity and Resistance to Fast Algebraic Attacks [PDF]
In this paper, three constructions of balanced Boolean functions with optimal algebraic immunity are proposed. It is checked that, at least for small numbers of input variables, these functions have good behavior against fast algebraic attacks as well. Other cryptographic properties such as algebraic degree and nonlinearity of the constructed functions
Xiangyong Zeng +3 more
openaire +1 more source
In this paper, a novel scheme for secure audio transmission is introduced. The novelty of this scheme is that it combines four different techniques for audio encryption in the same scheme which makes it more secure: self-adaptive scrambling, multi ...
Roayat Ismail Abdelfatah
doaj +1 more source
Single Trace Side Channel Analysis on NTRU Implementation
As researches on the quantum computer have progressed immensely, interests in post-quantum cryptography have greatly increased. NTRU is one of the well-known algorithms due to its practical key sizes and fast performance along with the resistance against
Soojung An +4 more
doaj +1 more source
S-Box on Subgroup of Galois Field
In substitution−permutation network as a cryptosystem, substitution boxes play the role of the only nonlinear part. It would be easy for adversaries to compromise the security of the system without them.
Tariq Shah, Ayesha Qureshi
doaj +1 more source
Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers [PDF]
Recently proposed algebraic attacks [2,6] and fast algebraic attacks [1,5] have provided the best analyses against some deployed LFSR-based ciphers. The process complexity is exponential in the degree of the equations. Fast algebraic attacks were introduced [5] as a way of reducing run-time complexity by reducing the degree of the system of equations ...
Philip Hawkes, Gregory G. Rose
openaire +1 more source
Decoding the Tensor Product of MLD Codes and Applications for Code Cryptosystems
For the practical application of code cryptosystems such as McEliece, it is necessary that the code used in the cryptosystem should have a fast decoding algorithm.
Vladimir Mikhailovich Deundyak +2 more
doaj +1 more source
Some results on fast algebraic attacks and higher-order non-linearities
In this study, the authors investigate the resistance of Boolean functions against fast algebraic attacks and deduce a bound between fast algebraic immunity and higher-order non-linearity (it is the first time that a bound between these two cryptographic criteria is given).
Q. Wang, T. Johansson, H. Kan
openaire +1 more source
Improving Fast Algebraic Attacks [PDF]
An algebraic attack is a method for cryptanalysis which is based on finding and solving a system of nonlinear equations. Recently, algebraic attacks where found helpful in cryptanalysing LFSR-based stream ciphers. The efficiency of these attacks greatly depends on the degree of the nonlinear equations.
openaire +2 more sources

