Results 51 to 60 of about 4,428 (114)

Constructing Efficient Identity‐Based Signatures on Lattices

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
In this work, we explore the recent developments related to lattice‐based signature and preimage sampling, and specify a compact identity‐based signature (IBS) on an ideal lattice for practical use. Specifically, we first propose an ellipsoid version of the G + G signature scheme (Asiacrypt 2023) that achieves slightly better signature size and higher ...
Huiwen Jia   +4 more
wiley   +1 more source

A Fast Search Method for 3‐Share Second‐Order Masking Schemes for Lightweight S‐Boxes

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Masking schemes are widely adopted strategies for countering side‐channel analysis (SCA) attacks. The initial hardware masking strategy, threshold implementation (TI), provides robust security against glitches in hardware platforms. The minimum number of shares required for a TI scheme depends not only on the desired security order but also on the ...
Yanhong Fan   +4 more
wiley   +1 more source

Green IoT: Energy Efficiency, Renewable Integration, and Security Implications

open access: yesIET Networks, Volume 14, Issue 1, January/December 2025.
This paper surveys energy management strategies in IoT, emphasising energy harvesting and saving techniques to reduce energy consumption and extend network lifespan. It explores renewable energy integration to lower carbon footprints and improve device efficiency, while addressing security vulnerabilities in energy management practices.
Mohammed Qasim Alazzawi   +3 more
wiley   +1 more source

Towards a combined Rotational-Differential Cryptanalytic Framework [PDF]

open access: yes, 2014
In this report, we suggest a new cryptanalytic framework of constructing distinguishers which can be eventually extended to full attacks in the related-key scenario. We name this new paradigm as ”Relational Cryptanalysis”. The main idea is to exhibit the
Christofi, M.   +2 more
core  

Applications of tripled chaotic maps in cryptography

open access: yes, 2007
Security of information has become a major issue during the last decades. New algorithms based on chaotic maps were suggested for protection of different types of multimedia data, especially digital images and videos in this period. However, many of them
A. Akhavan   +48 more
core   +1 more source

Quantum Secure Image Transmission: A Chaos‐Assisted Quantum Key Distribution Approach Using Entanglement

open access: yesIET Quantum Communication, Volume 6, Issue 1, January/December 2025.
A novel secure image transmission scheme has been proposed using the logistic chaos map and the Ekert protocol. The quantum key distribution can be used to generate seed parameters for classical chaos, thus ensuring a strong encryption method. ABSTRACT The emergence of quantum computing has introduced unprecedented security challenges to conventional ...
Raiyan Rahman   +4 more
wiley   +1 more source

ESTABLISHED WAYS TO ATTACK EVEN THE BEST ENCRYPTION ALGORITHM [PDF]

open access: yes
Which solution is the best – public key or private key encryption? This question cannot have a very rigorous, logical and definitive answer, so that the matter be forever settled :).
Alexandru Tabusca
core  

Enhancement of Secrecy of Block Ciphered Systems by Deliberate Noise

open access: yes, 2012
This paper considers the problem of end-end security enhancement by resorting to deliberate noise injected in ciphertexts. The main goal is to generate a degraded wiretap channel in application layer over which Wyner-type secrecy encoding is invoked to ...
Khiabani, Yahya S.   +3 more
core   +1 more source

Decorrelation: A Theory for Block Cipher Security [PDF]

open access: yes, 2018
Pseudorandomness is a classical model for the security of block ciphers. In this paper we propose convenient tools in order to study it in connection with the Shannon Theory, the Carter-Wegman universal hash functions paradigm, and the Luby-Rackoff ...
Vaudenay, Serge
core  

Differential Cryptanalysis of Feistel’s Iterated Block Ciphers [PDF]

open access: yes, 2000
В статті обговорюються базові принципи Диференційного криптоаналіза, концепції, алгоритми, ідеї і методи, які забезпечують цей тип атаки, а також математичне обгрунтування.Here are described the basic principles of Differential Cryptanalysis, concepts ...
Limar, Sergey, Telizhenko, Alexander
core  

Home - About - Disclaimer - Privacy