Results 31 to 40 of about 4,404 (114)

Random Strip Peeling: A novel lightweight image encryption for IoT devices based on colour planes permutation

open access: yesCAAI Transactions on Intelligence Technology, Volume 10, Issue 2, Page 529-544, April 2025.
Abstract This paper introduces a novel lightweight colour image encryption algorithm, specifically designed for resource‐constrained environments such as Internet of Things (IoT) devices. As IoT systems become increasingly prevalent, secure and efficient data transmission becomes crucial.
Kenan İnce, Cemile İnce, Davut Hanbay
wiley   +1 more source

LEE: Light‐Weight Energy‐Efficient encryption algorithm for sensor networks [PDF]

open access: yes, 2007
Data confidentiality in wireless sensor networks is mainly achieved by RC5 and Skipjack encryption algorithms. However, both algorithms have their weaknesses, for example RC5 supports variable-bit rotations, which are computationally expensive operations
Komninos, N.   +2 more
core  

A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications

open access: yesEngineering Reports, Volume 7, Issue 1, January 2025.
A novel image encryption algorithm has been developed to impart security to the digital color images. ABSTRACT The rapid proliferation of Internet of Things (IoT) devices has underscored the critical need to safeguard the data they store and transmit.
Muhammad Aqeel   +6 more
wiley   +1 more source

Challenges in Modelling Analog PUFs: A Study of Hybrid and Diode Triode Current Mirror Inverter PUF Under Machine Learning Attacks

open access: yesIET Circuits, Devices &Systems, Volume 2025, Issue 1, 2025.
Physically unclonable function‐based authentication is one of the widely accepted and promising hardware security primitives. For security applications, strong PUF circuits can generate a large number of challenge–response pairs (CRPs) for authentication.
Gisha Chittattukara Girijan   +5 more
wiley   +1 more source

Error Function Attack of chaos synchronization based encryption schemes

open access: yes, 2003
Different chaos synchronization based encryption schemes are reviewed and compared from the practical point of view. As an efficient cryptanalysis tool for chaos encryption, a proposal based on the Error Function Attack is presented systematically and ...
Hu, Gang   +3 more
core   +1 more source

Detailed Assessment of Hardware Implementations, Attacks and Countermeasures for the Ascon Authenticated Cipher

open access: yesElectronics Letters, Volume 61, Issue 1, January/December 2025.
ASCON has been selected by the National Institute of Standards and Technology (NIST) as the new authenticated cipher for lightweight environments. This paper analyses ASCON's hardware (HW) security through its HW implementation schemes, successful HW attacks and the proposed HW countermeasures against them, aiming to serve as a starting point for ...
Miguel Martín‐González   +3 more
wiley   +1 more source

Lightweight Encryption for Raw‐Format Live Video Streaming Over Automotive Ethernet

open access: yesElectronics Letters, Volume 61, Issue 1, January/December 2025.
The proposed lightweight encryption scheme is implemented using GStreamer pipeline elements to provide secure raw‐format live video streaming over automotive Ethernet. In order to derive an optimal trade‐off between encryption robustness and low CPU overhead under limited CPU resources, the confidentiality of the proposed scheme is evaluated through ...
Kyungmin Go, Seungkwang Lee
wiley   +1 more source

A DNA‐Dynamic Permutation‐Diffusion Algorithm for Image Encryption Using Scaling Chaotification Models and Advanced DNA Operations

open access: yesIET Image Processing, Volume 19, Issue 1, January/December 2025.
This paper proposes a DNA‐Dynamic Concurrent Permutation‐Diffusion Algorithm (DNA‐DCP‐DA) for secure image encryption, employing novel scaling chaotification models and advanced noncommutative DNA operations to address weaknesses in existing systems.
Mustafa Kamil Khairullah   +5 more
wiley   +1 more source

A New Method for Constructing Integral‐Resistance Matrix for 5‐Round AES

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
A powerful theory for evaluating block ciphers against integral distinguishers was introduced by Hebborn et al. at ASIACRYPT 2021. To show the integral‐resistance property for a block cipher, their core idea is to construct a full‐rank integral‐resistance matrix. However, their method does not work practically for 5‐round AES due to the large S‐box and
Fanyang Zeng, Tian Tian, Qichun Wang
wiley   +1 more source

Enhancement of Secrecy of Block Ciphered Systems by Deliberate Noise

open access: yes, 2012
This paper considers the problem of end-end security enhancement by resorting to deliberate noise injected in ciphertexts. The main goal is to generate a degraded wiretap channel in application layer over which Wyner-type secrecy encoding is invoked to ...
Khiabani, Yahya S.   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy