Results 41 to 50 of about 4,428 (114)
LEE: Light‐Weight Energy‐Efficient encryption algorithm for sensor networks [PDF]
Data confidentiality in wireless sensor networks is mainly achieved by RC5 and Skipjack encryption algorithms. However, both algorithms have their weaknesses, for example RC5 supports variable-bit rotations, which are computationally expensive operations
Komninos, N. +2 more
core
A novel image encryption algorithm has been developed to impart security to the digital color images. ABSTRACT The rapid proliferation of Internet of Things (IoT) devices has underscored the critical need to safeguard the data they store and transmit.
Muhammad Aqeel +6 more
wiley +1 more source
Physically unclonable function‐based authentication is one of the widely accepted and promising hardware security primitives. For security applications, strong PUF circuits can generate a large number of challenge–response pairs (CRPs) for authentication.
Gisha Chittattukara Girijan +5 more
wiley +1 more source
ASCON has been selected by the National Institute of Standards and Technology (NIST) as the new authenticated cipher for lightweight environments. This paper analyses ASCON's hardware (HW) security through its HW implementation schemes, successful HW attacks and the proposed HW countermeasures against them, aiming to serve as a starting point for ...
Miguel Martín‐González +3 more
wiley +1 more source
Lightweight Encryption for Raw‐Format Live Video Streaming Over Automotive Ethernet
The proposed lightweight encryption scheme is implemented using GStreamer pipeline elements to provide secure raw‐format live video streaming over automotive Ethernet. In order to derive an optimal trade‐off between encryption robustness and low CPU overhead under limited CPU resources, the confidentiality of the proposed scheme is evaluated through ...
Kyungmin Go, Seungkwang Lee
wiley +1 more source
Error Function Attack of chaos synchronization based encryption schemes
Different chaos synchronization based encryption schemes are reviewed and compared from the practical point of view. As an efficient cryptanalysis tool for chaos encryption, a proposal based on the Error Function Attack is presented systematically and ...
Hu, Gang +3 more
core +1 more source
This paper proposes a DNA‐Dynamic Concurrent Permutation‐Diffusion Algorithm (DNA‐DCP‐DA) for secure image encryption, employing novel scaling chaotification models and advanced noncommutative DNA operations to address weaknesses in existing systems.
Mustafa Kamil Khairullah +5 more
wiley +1 more source
A New Method for Constructing Integral‐Resistance Matrix for 5‐Round AES
A powerful theory for evaluating block ciphers against integral distinguishers was introduced by Hebborn et al. at ASIACRYPT 2021. To show the integral‐resistance property for a block cipher, their core idea is to construct a full‐rank integral‐resistance matrix. However, their method does not work practically for 5‐round AES due to the large S‐box and
Fanyang Zeng, Tian Tian, Qichun Wang
wiley +1 more source
Cryptanalysis on Two Kinds of Number Theoretic Pseudo‐Random Generators Using Coppersmith Method
Pseudo‐random number generator (PRNG) is a type of algorithm that generates a sequence of random numbers using a mathematical formula, which is widely used in computer science, such as simulation, modeling applications, data encryption, et cetera. The efficiency and security of PRNG are closely related to its output bits at each iteration.
Ran Zhang +4 more
wiley +1 more source
Innovative Method of the Power Analysis [PDF]
This paper describes an innovative method of the power analysis which presents the typical example of successful attacks against trusted cryptographic devices such as RFID (Radio-Frequency IDentifications) and contact smart cards.
Martinasek, Z., Zeman, V.
core +1 more source

