Results 71 to 80 of about 6,661,504 (214)
NoLIEM: A Novel Lightweight Image Encryption Method for Resource‐Constrained IoT Devices
The expanded use of Internet of Things (IoT) devices in smart homes, industrial automation, healthcare, and smart cities has increased the risk of unauthorized access, data breaches, and man‐in‐the‐middle attacks. Traditional encryption methods like AES and RSA are too energy‐ and processing‐intensive for IoT devices.
Athraa J. H. Witwit +3 more
wiley +1 more source
One of the main security requirements for symmetric-key block ciphers is resistance against differential cryptanalysis. This is commonly assessed by counting the number of active substitution boxes (S-boxes) using search algorithms or mathematical ...
Mohamed Fadl Idris +3 more
doaj +1 more source
Cryptanalysis of Feistel Networks with Secret Round Functions [PDF]
Generic distinguishers against Feistel Network with up to 5 rounds exist in the regular setting and up to 6 rounds in a multi-key setting. We present new cryptanalyses against Feistel Networks with 5, 6 and 7 rounds which are not simply distinguishers but actually recover completely the unknown Feistel functions. When an exclusive-or is used to combine
Biryukov, Alex +2 more
openaire +2 more sources
The growth of billions of devices functioning in resource‐constrained situations in the Internet of Things (IoT) era poses serious security issues. As a result of their limited processing power efficiency, memory, and battery life, traditional cryptographic algorithms like elliptic curve cryptography (ECC), Rivest–Shamir–Adleman (RSA), and Advanced ...
Nahom Gebeyehu Zinabu +4 more
wiley +1 more source
Research on Block Cipher Technology [PDF]
With the rapid advancement of information technology, Humanity will enter the era of the Internet of Things, with billions of IoT devices connected to the network, and network attacks targeting user privacy, network environment, etc.
Yin Yuanhao
doaj +1 more source
LMQSAS - post-quantum aggregate signature scheme with lazy verification
Aggregated signatures are a type of digital signatures that allow individual signatures obtained by different signers for different messages to be combined into a single signature that provides authenticity, integrity, and non-repudiation for all signed ...
Artyom O. Makarov
doaj +1 more source
Differential Cryptanalysis of Round-Reduced Sparx-64/128 [PDF]
Sparx is a family of ARX-based block ciphers designed according to the long-trail strategy (LTS) that were both introduced by Dinu et al. at ASIACRYPT'16.
Ankele, Ralph, List, Eik
core +2 more sources
Multi‐Scale Soil Salinization Dynamics From Global to Pore Scale: A Review
Abstract Soil salinization refers to the accumulation of water‐soluble salts in the upper part of the soil profile. Excessive levels of soil salinity affects crop production, soil health, and ecosystem functioning. This phenomenon threatens agriculture, food security, soil stability, and fertility leading to land degradation and loss of essential soil ...
Nima Shokri +2 more
wiley +1 more source
LEE: Light‐Weight Energy‐Efficient encryption algorithm for sensor networks [PDF]
Data confidentiality in wireless sensor networks is mainly achieved by RC5 and Skipjack encryption algorithms. However, both algorithms have their weaknesses, for example RC5 supports variable-bit rotations, which are computationally expensive operations
Komninos, N. +2 more
core
The related-key analysis of feistel constructions [PDF]
Lecture Notes in Computer Science, Volume 8540, 2015.It is well known that the classical three- and four-round Feistel constructions are provably secure under chosen-plaintext and chosen-ciphertext attacks, respectively.
A Biryukov +34 more
core +1 more source

