Results 71 to 80 of about 6,728,968 (223)

Hydraulics of Channelized Flow in Ice‐Supersaturated Debris: 1. Rock Glacier Hydrology in Alpine Glacial‐Periglacial Systems

open access: yesWater Resources Research, Volume 61, Issue 2, February 2025.
Abstract Frozen sediment accumulations, including rock glaciers, talus, and moraines, constitute complex aquifers in permafrost‐affected terrain. The spatial distribution of permafrost ice largely governs the flow of water through the subsurface, which exhibits a spectrum of flow patterns, ranging from diffuse flow through a porous matrix to ...
Magdalena Seelig   +3 more
wiley   +1 more source

Design Trends and Comparative Analysis of Lightweight Block Ciphers for IoTs

open access: yesApplied Sciences
This paper provides a comprehensive survey of 58 lightweight block ciphers (LWBCs) introduced between 2018 and 2025, designed specifically for securing resource-constrained environments such as the Internet of Things (IoTs).
Safia Meteb Al-Nofaie   +2 more
doaj   +1 more source

Unbalanced Feistel networks and block cipher design [PDF]

open access: yes, 1996
We examine a generalization of the concept of Feistel networks, which we call Unbalanced Feistel Networks (UFNs). Like conventional Feistel networks, UFNs consist of a series of rounds in which one part of the block operates on the rest of the block. However, in a UFN the two parts need not be of equal size. Removing this limitation on Feistel networks
Bruce Schneier, John Kelsey
openaire   +1 more source

A DNA‐Dynamic Permutation‐Diffusion Algorithm for Image Encryption Using Scaling Chaotification Models and Advanced DNA Operations

open access: yesIET Image Processing, Volume 19, Issue 1, January/December 2025.
This paper proposes a DNA‐Dynamic Concurrent Permutation‐Diffusion Algorithm (DNA‐DCP‐DA) for secure image encryption, employing novel scaling chaotification models and advanced noncommutative DNA operations to address weaknesses in existing systems.
Mustafa Kamil Khairullah   +5 more
wiley   +1 more source

A Deep Learning Approach for Active S-Box Prediction of Lightweight Generalized Feistel Block Ciphers

open access: yesIEEE Access, 2021
One of the main security requirements for symmetric-key block ciphers is resistance against differential cryptanalysis. This is commonly assessed by counting the number of active substitution boxes (S-boxes) using search algorithms or mathematical ...
Mohamed Fadl Idris   +3 more
doaj   +1 more source

Cryptanalysis of Feistel Networks with Secret Round Functions [PDF]

open access: yes, 2016
Generic distinguishers against Feistel Network with up to 5 rounds exist in the regular setting and up to 6 rounds in a multi-key setting. We present new cryptanalyses against Feistel Networks with 5, 6 and 7 rounds which are not simply distinguishers but actually recover completely the unknown Feistel functions. When an exclusive-or is used to combine
Biryukov, Alex   +2 more
openaire   +2 more sources

NoLIEM: A Novel Lightweight Image Encryption Method for Resource‐Constrained IoT Devices

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The expanded use of Internet of Things (IoT) devices in smart homes, industrial automation, healthcare, and smart cities has increased the risk of unauthorized access, data breaches, and man‐in‐the‐middle attacks. Traditional encryption methods like AES and RSA are too energy‐ and processing‐intensive for IoT devices.
Athraa J. H. Witwit   +3 more
wiley   +1 more source

Research on Block Cipher Technology [PDF]

open access: yesITM Web of Conferences
With the rapid advancement of information technology, Humanity will enter the era of the Internet of Things, with billions of IoT devices connected to the network, and network attacks targeting user privacy, network environment, etc.
Yin Yuanhao
doaj   +1 more source

LMQSAS - post-quantum aggregate signature scheme with lazy verification

open access: yesБезопасность информационных технологий, 2023
Aggregated signatures are a type of digital signatures that allow individual signatures obtained by different signers for different messages to be combined into a single signature that provides authenticity, integrity, and non-repudiation for all signed ...
Artyom O. Makarov
doaj   +1 more source

Comprehensive Analysis of Lightweight Cryptographic Algorithms for Battery‐Limited Internet of Things Devices

open access: yesInternational Journal of Distributed Sensor Networks, Volume 2025, Issue 1, 2025.
The growth of billions of devices functioning in resource‐constrained situations in the Internet of Things (IoT) era poses serious security issues. As a result of their limited processing power efficiency, memory, and battery life, traditional cryptographic algorithms like elliptic curve cryptography (ECC), Rivest–Shamir–Adleman (RSA), and Advanced ...
Nahom Gebeyehu Zinabu   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy