Results 81 to 90 of about 6,661,504 (214)

A literature review on V2X communications security: Foundation, solutions, status, and future

open access: yesIET Communications, Volume 18, Issue 20, Page 1683-1715, December 2024.
The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV ...
Zuobin Ying   +3 more
wiley   +1 more source

Developed Method of Information Hiding in Video AVI File Based on Hybrid Encryption and Steganography [PDF]

open access: yesEngineering and Technology Journal, 2011
This paper produces a development of an AVI Hiding Information System (HIS) based on steganography techniques to prevent intruders to obtain the transmitted information.
Susan S. Ghazoul   +2 more
doaj   +1 more source

Different fates of metabolites and small variation in chemical composition characterise frass chemistry in a specialist caterpillar

open access: yesPhysiological Entomology, Volume 49, Issue 2, Page 110-117, June 2024.
We studied the metabolism of caterpillars of the poplar hawk‐moth (Laothoe populi L.)—a specialist insect herbivore—on different host plants. Caterpillars feeding on the same host plant unveiled small chemical variation in their frass profiles. Ingested flavonoids were most widely passively excreted by the caterpillars, whereas salicinoids were ...
Carlo L. Seifert   +2 more
wiley   +1 more source

SAT-Based Security Evaluation for WARP against Linear Cryptanalysis

open access: yesIET Information Security, 2023
WARP, an efficient lightweight block cipher presented by Banik et al., offers a viable alternative to AES with its 128-bit block and a 128-bit key.
Jiali Shi, Guoqiang Liu, Chao Li
doaj   +1 more source

Studi Dan Implementasi Algoritma Blowfish Untuk Enkripsi Email [PDF]

open access: yes, 2010
The needs of information currently encourage the growth of information security methods. Art encryption and security is the cryptographic message is growing very fast right now.
Fathoni, Kholid   +2 more
core  

Bit‐Based Evaluation of Lightweight Block Ciphers SLIM, LBC‐IoT, and SLA by Mixed Integer Linear Programming

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
Many lightweight block ciphers have been proposed for IoT devices that have limited resources. SLIM, LBC‐IoT, and SLA are lightweight block ciphers developed for IoT systems. The designer of SLIM presented a 7‐round differential distinguisher and an 11‐round linear trail using a heuristic method. We have comprehensively sought the longest distinguisher
Nobuyuki Sugio, Qichun Wang
wiley   +1 more source

A Novel Block Encryption Algorithm Based on Chaotic S-Box for Wireless Sensor Network

open access: yesIEEE Access, 2019
In order to ensure the basic security of wireless sensor networks (WSNs), a block encryption algorithm based on chaotic substitution box (S-box) is proposed.
Longteng Yi   +5 more
doaj   +1 more source

Каскадна схема фейстеля та її стійкість до диференціального та лінійного криптоаналізу [PDF]

open access: yes, 2009
Запропоновано та проаналізовано нову конструкцію блочних шифрів – каскадну схему Фейстеля, виведені оцінки її стійкості до диференціального та лінійного криптоаналізу.New construction of block ciphers’ design, a cascade Feistel network, is proposed and ...
Яковлєв, Сергій Володимирович
core  

A New (Related‐Key) Neural Distinguisher Using Two Differences for Differential Cryptanalysis

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
At CRYPTO 2019, Gohr showed the significant advantages of neural distinguishers over traditional distinguishers in differential cryptanalysis. At fast software encryption (FSE) 2024, Bellini et al. provided a generic tool to automatically train the (related‐key) differential neural distinguishers for different block ciphers. In this paper, based on the
Gao Wang   +3 more
wiley   +1 more source

Optimized SM4 Hardware Implementations for Low Area Consumption

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
The SM4 block cipher is standardized in ISO/IEC, and it is also the national standard of commercial cryptography in China. In this paper, we propose two new techniques called “split‐and‐join” and “off‐peak and stagger” to make SM4 more applicable to resource‐constrained environments.
Ruolin Zhang   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy