Results 111 to 120 of about 6,661,504 (214)

SCAN-C: a lightweight cryptographic algorithm to secure CAN communications in modern vehicles

open access: yesCybersecurity
A controller area network (CAN, ISO-11898:2003) is the central nervous system of contemporary, high-tech vehicles, which links electronic control units (ECUs) to offer a distinctive driving experience through data communication.
Nagaraj Hediyal   +2 more
doaj   +1 more source

A Structural Attack on Type-I Generalized Feistel Networks

open access: yesIEEE Access, 2019
This paper presents generic structural cryptanalysis against type-I generalized Feistel networks (GFN), in which all the inner transformations are unknown. The target of our attack is to retrieve all the unknown round functions.
Ting Cui, Shiwei Chen, Haoran Zheng
doaj   +1 more source

Comparative Advantage Learning Software: Application (Off-line) Software with Assessment Capabilities [PDF]

open access: yes
This paper describes software, written by the author, for learning comparative advantage and the specialisation gains from trade. Starting with given absolute costs and available resources for two nations, the student constructs production possibilities ...
John Lovett
core  

FeistelX network-based image encryption leveraging hyperchaotic fusion and extended DNA coding

open access: yesEgyptian Informatics Journal
The rising frequency of cyberattacks has heightened the need for more secure and efficient image encryption techniques. Traditional chaotic and DNA-based methods often struggle with limited key space, low diffusion efficiency, or vulnerability to ...
Kristiawan Nugroho   +4 more
doaj   +1 more source

DRcipher: A pseudo-random dynamic round lightweight block cipher

open access: yesJournal of King Saud University: Computer and Information Sciences
The Internet of Things (IoT) has gained popularity in various fields, including components such as embedded devices and wireless sensors. However, ensuring the security of data transmission from these devices is of critical importance.
Juanli Kuang   +3 more
doaj   +1 more source

SUMER: A New Family of Lightweight and Traditional Block Ciphers with Multi-Modes

open access: yesIraqi Journal for Computer Science and Mathematics
With the recent increase in the risks and attacks facing our daily lives and digital environment around us, the trend towards securing data has become inevitable.
omar dawood
doaj   +1 more source

Population genomics of diarrheagenic Escherichia coli uncovers high connectivity between urban and rural communities in Ecuador. [PDF]

open access: yesInfect Genet Evol, 2023
Rothstein AP   +5 more
europepmc   +1 more source

Discussion on Secure Standard Network of Sensors Powered by Microbial Fuel Cells. [PDF]

open access: yesSensors (Basel), 2023
da Rocha H   +4 more
europepmc   +1 more source

Square reflection cryptanalysis of 5-round Feistel networks with permutations

open access: yesInformation Processing Letters, 2013
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +2 more sources

Home - About - Disclaimer - Privacy