Results 81 to 90 of about 6,661,504 (214)
A literature review on V2X communications security: Foundation, solutions, status, and future
The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV ...
Zuobin Ying +3 more
wiley +1 more source
Developed Method of Information Hiding in Video AVI File Based on Hybrid Encryption and Steganography [PDF]
This paper produces a development of an AVI Hiding Information System (HIS) based on steganography techniques to prevent intruders to obtain the transmitted information.
Susan S. Ghazoul +2 more
doaj +1 more source
We studied the metabolism of caterpillars of the poplar hawk‐moth (Laothoe populi L.)—a specialist insect herbivore—on different host plants. Caterpillars feeding on the same host plant unveiled small chemical variation in their frass profiles. Ingested flavonoids were most widely passively excreted by the caterpillars, whereas salicinoids were ...
Carlo L. Seifert +2 more
wiley +1 more source
SAT-Based Security Evaluation for WARP against Linear Cryptanalysis
WARP, an efficient lightweight block cipher presented by Banik et al., offers a viable alternative to AES with its 128-bit block and a 128-bit key.
Jiali Shi, Guoqiang Liu, Chao Li
doaj +1 more source
Studi Dan Implementasi Algoritma Blowfish Untuk Enkripsi Email [PDF]
The needs of information currently encourage the growth of information security methods. Art encryption and security is the cryptographic message is growing very fast right now.
Fathoni, Kholid +2 more
core
Many lightweight block ciphers have been proposed for IoT devices that have limited resources. SLIM, LBC‐IoT, and SLA are lightweight block ciphers developed for IoT systems. The designer of SLIM presented a 7‐round differential distinguisher and an 11‐round linear trail using a heuristic method. We have comprehensively sought the longest distinguisher
Nobuyuki Sugio, Qichun Wang
wiley +1 more source
A Novel Block Encryption Algorithm Based on Chaotic S-Box for Wireless Sensor Network
In order to ensure the basic security of wireless sensor networks (WSNs), a block encryption algorithm based on chaotic substitution box (S-box) is proposed.
Longteng Yi +5 more
doaj +1 more source
Каскадна схема фейстеля та її стійкість до диференціального та лінійного криптоаналізу [PDF]
Запропоновано та проаналізовано нову конструкцію блочних шифрів – каскадну схему Фейстеля, виведені оцінки її стійкості до диференціального та лінійного криптоаналізу.New construction of block ciphers’ design, a cascade Feistel network, is proposed and ...
Яковлєв, Сергій Володимирович
core
A New (Related‐Key) Neural Distinguisher Using Two Differences for Differential Cryptanalysis
At CRYPTO 2019, Gohr showed the significant advantages of neural distinguishers over traditional distinguishers in differential cryptanalysis. At fast software encryption (FSE) 2024, Bellini et al. provided a generic tool to automatically train the (related‐key) differential neural distinguishers for different block ciphers. In this paper, based on the
Gao Wang +3 more
wiley +1 more source
Optimized SM4 Hardware Implementations for Low Area Consumption
The SM4 block cipher is standardized in ISO/IEC, and it is also the national standard of commercial cryptography in China. In this paper, we propose two new techniques called “split‐and‐join” and “off‐peak and stagger” to make SM4 more applicable to resource‐constrained environments.
Ruolin Zhang +5 more
wiley +1 more source

