Results 51 to 60 of about 4,428 (114)
Constructing Efficient Identity‐Based Signatures on Lattices
In this work, we explore the recent developments related to lattice‐based signature and preimage sampling, and specify a compact identity‐based signature (IBS) on an ideal lattice for practical use. Specifically, we first propose an ellipsoid version of the G + G signature scheme (Asiacrypt 2023) that achieves slightly better signature size and higher ...
Huiwen Jia +4 more
wiley +1 more source
A Fast Search Method for 3‐Share Second‐Order Masking Schemes for Lightweight S‐Boxes
Masking schemes are widely adopted strategies for countering side‐channel analysis (SCA) attacks. The initial hardware masking strategy, threshold implementation (TI), provides robust security against glitches in hardware platforms. The minimum number of shares required for a TI scheme depends not only on the desired security order but also on the ...
Yanhong Fan +4 more
wiley +1 more source
Green IoT: Energy Efficiency, Renewable Integration, and Security Implications
This paper surveys energy management strategies in IoT, emphasising energy harvesting and saving techniques to reduce energy consumption and extend network lifespan. It explores renewable energy integration to lower carbon footprints and improve device efficiency, while addressing security vulnerabilities in energy management practices.
Mohammed Qasim Alazzawi +3 more
wiley +1 more source
Towards a combined Rotational-Differential Cryptanalytic Framework [PDF]
In this report, we suggest a new cryptanalytic framework of constructing distinguishers which can be eventually extended to full attacks in the related-key scenario. We name this new paradigm as ”Relational Cryptanalysis”. The main idea is to exhibit the
Christofi, M. +2 more
core
Applications of tripled chaotic maps in cryptography
Security of information has become a major issue during the last decades. New algorithms based on chaotic maps were suggested for protection of different types of multimedia data, especially digital images and videos in this period. However, many of them
A. Akhavan +48 more
core +1 more source
A novel secure image transmission scheme has been proposed using the logistic chaos map and the Ekert protocol. The quantum key distribution can be used to generate seed parameters for classical chaos, thus ensuring a strong encryption method. ABSTRACT The emergence of quantum computing has introduced unprecedented security challenges to conventional ...
Raiyan Rahman +4 more
wiley +1 more source
ESTABLISHED WAYS TO ATTACK EVEN THE BEST ENCRYPTION ALGORITHM [PDF]
Which solution is the best – public key or private key encryption? This question cannot have a very rigorous, logical and definitive answer, so that the matter be forever settled :).
Alexandru Tabusca
core
Enhancement of Secrecy of Block Ciphered Systems by Deliberate Noise
This paper considers the problem of end-end security enhancement by resorting to deliberate noise injected in ciphertexts. The main goal is to generate a degraded wiretap channel in application layer over which Wyner-type secrecy encoding is invoked to ...
Khiabani, Yahya S. +3 more
core +1 more source
Decorrelation: A Theory for Block Cipher Security [PDF]
Pseudorandomness is a classical model for the security of block ciphers. In this paper we propose convenient tools in order to study it in connection with the Shannon Theory, the Carter-Wegman universal hash functions paradigm, and the Luby-Rackoff ...
Vaudenay, Serge
core
Differential Cryptanalysis of Feistel’s Iterated Block Ciphers [PDF]
В статті обговорюються базові принципи Диференційного криптоаналіза, концепції, алгоритми, ідеї і методи, які забезпечують цей тип атаки, а також математичне обгрунтування.Here are described the basic principles of Differential Cryptanalysis, concepts ...
Limar, Sergey, Telizhenko, Alexander
core

