Results 1 to 10 of about 6,661,504 (214)

Cryptanalysis and Improvement of the Image Encryption Scheme Based on Feistel Network and Dynamic DNA Encoding

open access: yesIEEE Access, 2021
In order to improve the security and efficiency of image encryption, many researchers have continuously proposed new image encryption schemes in recent years. However, these image encryption schemes have not been fully analyzed and evaluated.
Wei Feng   +3 more
doaj   +2 more sources

An Image Encryption Method Based on the Feistel Network and Dynamic DNA Encoding

open access: yesIEEE Photonics Journal, 2018
Based on the Feistel network and dynamic deoxyribonucleic acid (DNA) encoding technology, an image encryption method is proposed using the “permutation–diffusion–scrambling” structure.
Xuncai Zhang, Zheng Zhou, Ying Niu
doaj   +2 more sources

Integrating Quadratic Polynomial and Symbolic Chaotic Map-Based Feistel Network to Improve Image Encryption Performance

open access: yesIEEE Access
This research introduces an innovative image encryption method that amalgamates two secure and efficient chaotic maps, namely a 2D Simplified Quadratic Polynomial Map (2D-SQPM) and a 2D Symbolic Chaotic Map (2D-SCM), within an enhanced Feistel network ...
Edy Winarno   +3 more
doaj   +2 more sources

Distinguishers for 4-Branch and 8-Branch Generalized Feistel Network

open access: yesIEEE Access, 2017
In this paper, we present an eight round distinguisher for four-branch type-2 generalized Feistel network (GFN) with double-SP (DSP) functions and two distinguishers for eight-branch type-2 GFN with single-SP (SSP) functions in a known key attack (KKA ...
Donghoon Chang   +2 more
doaj   +2 more sources

Model of nonconventional encryption algorithm based on nested Feistel network

open access: yesOpen Engineering, 2016
The purpose of research - studying the possibilities of practical application of the encryption algorithm based on nonpositional polynomial notations using nested Feistel network.
Nyssanbayeva Saule   +2 more
doaj   +2 more sources

A secure fingerprint hiding technique based on DNA sequence and mathematical function [PDF]

open access: yesPeerJ Computer Science
DNA steganography is a technique for securely transmitting important data using DNA sequences. It involves encrypting and hiding messages within DNA sequences to prevent unauthorized access and decoding of sensitive information.
Wala’a Essa Al-Ahmadi   +3 more
doaj   +3 more sources

Modified Generalized Feistel Network Block Cipher for the Internet of Things

open access: yesSymmetry, 2023
With the advent of the Internet-of-Things (IoT) technologies, millions of low-resource devices are constantly used at the network’s edge. As a result, the large amount of private and sensitive data generated by these devices must be securely transported,
Isma Norshahila Mohammad Shah   +3 more
semanticscholar   +1 more source

A Novel Chaotic Block Image Encryption Algorithm Based on Deep Convolutional Generative Adversarial Networks

open access: yesIEEE Access, 2021
This paper proposes a novel chaotic block image encryption algorithm based on deep convolutional generative adversarial networks (DCGANs), quaternions, an improved Feistel network, and an overall scrambling and diffusion mechanism.
Pengfei Fang, Han Liu, Chengmao Wu
doaj   +1 more source

End-to-End Encryption in Resource-Constrained IoT Device

open access: yesIEEE Access, 2023
Internet of Things (IoT) technologies will interconnect with a wide range of network devices, regardless of their local network and resource capacities.
Ala Saleh D. Alluhaidan, P. Prabu
doaj   +1 more source

Modification of the algorithm based on the Feistel network by adding an element of randomness into the encryption key

open access: yesВестник Пермского университета. Математика. Механика. Информатика, 2021
The article revealed the research of methods for constructing block ciphers and its advantages and disadvantages. The modified algorithm based on the Feistel network using Hamming codes and adding an element of randomness into the encryption key was ...
Pavel Chernov, Aleksander Shkaraputa
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy