Results 51 to 60 of about 12,474 (214)

Software system of cryptanalysis using impossible differentials method based on parallel programming technologies OpenMP and MPI [PDF]

open access: yes, 2013
Програма, яка розробляється в даному проекті, призначена для проведення криптоаналізу методом неможливих диференціалів блокового симетричного шифру AES, а саме – над елементами раунду.The program is being developed in this project is designed for ...
Novak, Nazarii   +1 more
core  

Further Results of the Cryptographic Properties on the Butterfly Structures

open access: yes, 2016
Recently, a new structure called butterfly introduced by Perrin et at. is attractive for that it has very good cryptographic properties: the differential uniformity is at most equal to 4 and algebraic degree is also very high when exponent $e=3$.
Feng, Xiutao, Fu, Shihui
core   +1 more source

Random Strip Peeling: A novel lightweight image encryption for IoT devices based on colour planes permutation

open access: yesCAAI Transactions on Intelligence Technology, Volume 10, Issue 2, Page 529-544, April 2025.
Abstract This paper introduces a novel lightweight colour image encryption algorithm, specifically designed for resource‐constrained environments such as Internet of Things (IoT) devices. As IoT systems become increasingly prevalent, secure and efficient data transmission becomes crucial.
Kenan İnce, Cemile İnce, Davut Hanbay
wiley   +1 more source

Multidimensional Zero-Correlation Linear Cryptanalysis of the Block Cipher KASUMI [PDF]

open access: yes, 2014
The block cipher KASUMI is widely used for security in many synchronous wireless standards. It was proposed by ETSI SAGE for usage in 3GPP (3rd Generation Partnership Project) ciphering algorthms in 2001.
Chen, Shaozhen, Yi, Wentan
core  

Performance analysis of energy efficient improved LEACH protocol in IoT networks

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
Abstract The Internet of Things incorporates embedded technologies, wireless sensor networks, control and automation technologies, and wearable devices to enable integrated buildings, enterprises, intelligent homes, and wearable devices. Because sensor nodes have limited power, the energy consumption of the Internet of Things network is critical.
Surbhi Bhatia   +3 more
wiley   +1 more source

A Better Key Schedule for DES-like Ciphers [PDF]

open access: yes, 1996
Several DES-like ciphers aren't utilizing their full potential strength, because of the short key and linear or otherwise easily tractable algorithms they use to generate their key schedules.
Bellovin, Steven Michael   +1 more
core   +3 more sources

A DNA‐Dynamic Permutation‐Diffusion Algorithm for Image Encryption Using Scaling Chaotification Models and Advanced DNA Operations

open access: yesIET Image Processing, Volume 19, Issue 1, January/December 2025.
This paper proposes a DNA‐Dynamic Concurrent Permutation‐Diffusion Algorithm (DNA‐DCP‐DA) for secure image encryption, employing novel scaling chaotification models and advanced noncommutative DNA operations to address weaknesses in existing systems.
Mustafa Kamil Khairullah   +5 more
wiley   +1 more source

New Yoyo Tricks with AES-based Permutations

open access: yesIACR Transactions on Symmetric Cryptology, 2018
In Asiacrypt 2017, Rønjom et al. reported some interesting generic properties of SPNs, leading to what they call the Yoyo trick, and applied it to find the most efficient distinguishers on AES.
Dhiman Saha   +2 more
doaj   +1 more source

Breaking an image encryption algorithm based on chaos

open access: yes, 2011
Recently, a chaos-based image encryption algorithm called MCKBA (Modified Chaotic-Key Based Algorithm) was proposed. This paper analyzes the security of MCKBA and finds that it can be broken with a differential attack, which requires only four chosen ...
Arroyo D.   +4 more
core   +1 more source

Yoyo Cryptanalysis Against Reduced‐Round L‐Feistel Structure for Recovering the Secret Components

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
L‐Feistel structure is a new iterative block cipher structure and unifies the Feistel structure and the Lai–Massey structure while maintaining the similarity of encryption and decryption. In this study, we present the first yoyo cryptanalysis against the L‐Feistel structure to evaluate the security under structural attack and give the method to recover
Jiyan Zhang   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy