Results 71 to 80 of about 6,728,968 (223)
Abstract Frozen sediment accumulations, including rock glaciers, talus, and moraines, constitute complex aquifers in permafrost‐affected terrain. The spatial distribution of permafrost ice largely governs the flow of water through the subsurface, which exhibits a spectrum of flow patterns, ranging from diffuse flow through a porous matrix to ...
Magdalena Seelig +3 more
wiley +1 more source
Design Trends and Comparative Analysis of Lightweight Block Ciphers for IoTs
This paper provides a comprehensive survey of 58 lightweight block ciphers (LWBCs) introduced between 2018 and 2025, designed specifically for securing resource-constrained environments such as the Internet of Things (IoTs).
Safia Meteb Al-Nofaie +2 more
doaj +1 more source
Unbalanced Feistel networks and block cipher design [PDF]
We examine a generalization of the concept of Feistel networks, which we call Unbalanced Feistel Networks (UFNs). Like conventional Feistel networks, UFNs consist of a series of rounds in which one part of the block operates on the rest of the block. However, in a UFN the two parts need not be of equal size. Removing this limitation on Feistel networks
Bruce Schneier, John Kelsey
openaire +1 more source
This paper proposes a DNA‐Dynamic Concurrent Permutation‐Diffusion Algorithm (DNA‐DCP‐DA) for secure image encryption, employing novel scaling chaotification models and advanced noncommutative DNA operations to address weaknesses in existing systems.
Mustafa Kamil Khairullah +5 more
wiley +1 more source
One of the main security requirements for symmetric-key block ciphers is resistance against differential cryptanalysis. This is commonly assessed by counting the number of active substitution boxes (S-boxes) using search algorithms or mathematical ...
Mohamed Fadl Idris +3 more
doaj +1 more source
Cryptanalysis of Feistel Networks with Secret Round Functions [PDF]
Generic distinguishers against Feistel Network with up to 5 rounds exist in the regular setting and up to 6 rounds in a multi-key setting. We present new cryptanalyses against Feistel Networks with 5, 6 and 7 rounds which are not simply distinguishers but actually recover completely the unknown Feistel functions. When an exclusive-or is used to combine
Biryukov, Alex +2 more
openaire +2 more sources
NoLIEM: A Novel Lightweight Image Encryption Method for Resource‐Constrained IoT Devices
The expanded use of Internet of Things (IoT) devices in smart homes, industrial automation, healthcare, and smart cities has increased the risk of unauthorized access, data breaches, and man‐in‐the‐middle attacks. Traditional encryption methods like AES and RSA are too energy‐ and processing‐intensive for IoT devices.
Athraa J. H. Witwit +3 more
wiley +1 more source
Research on Block Cipher Technology [PDF]
With the rapid advancement of information technology, Humanity will enter the era of the Internet of Things, with billions of IoT devices connected to the network, and network attacks targeting user privacy, network environment, etc.
Yin Yuanhao
doaj +1 more source
LMQSAS - post-quantum aggregate signature scheme with lazy verification
Aggregated signatures are a type of digital signatures that allow individual signatures obtained by different signers for different messages to be combined into a single signature that provides authenticity, integrity, and non-repudiation for all signed ...
Artyom O. Makarov
doaj +1 more source
The growth of billions of devices functioning in resource‐constrained situations in the Internet of Things (IoT) era poses serious security issues. As a result of their limited processing power efficiency, memory, and battery life, traditional cryptographic algorithms like elliptic curve cryptography (ECC), Rivest–Shamir–Adleman (RSA), and Advanced ...
Nahom Gebeyehu Zinabu +4 more
wiley +1 more source

