Results 71 to 80 of about 12,474 (214)

MergeMAC:A MAC for Authentication with Strict Time Constraints and Limited Bandwidth [PDF]

open access: yes, 2018
This paper presents MergeMAC, a MAC that is particularly suitable for environments with strict time requirements and extremely limited bandwidth. MergeMAC computes the MAC by splitting the message into two parts.
Ankele, Ralph   +2 more
core   +2 more sources

A literature review on V2X communications security: Foundation, solutions, status, and future

open access: yesIET Communications, Volume 18, Issue 20, Page 1683-1715, December 2024.
The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV ...
Zuobin Ying   +3 more
wiley   +1 more source

Efficient and Secure Chaotic S-Box for Wireless Sensor Network [PDF]

open access: yes, 2014
International audienceInformation security using chaotic dynamics is a novel topic in the wireless sensor network (WSN) research field. After surveying analog and digital chaotic security systems, we give a state of the art of chaotic S-Box design.
Alvarez   +23 more
core   +4 more sources

Evaluating cryptographic vulnerabilities created by quantum computing in industrial control systems

open access: yesJournal of Critical Infrastructure Policy, Volume 5, Issue 2, Page 88-110, Fall/Winter 2024.
Abstract Quantum computing is expected to eventually be able to break the public‐key cryptography algorithms currently used throughout information technology (IT) infrastructure, undermining foundational tools used to maintain information security across the country's critical infrastructure.
Michael J. D. Vermeer   +5 more
wiley   +1 more source

A Meaningful MD5 Hash Collision Attack [PDF]

open access: yes, 2006
It is now proved by Wang et al., that MD5 hash is no more secure, after they proposed an attack that would generate two different messages that gives the same MD5 sum. Many conditions need to be satisfied to attain this collision.
Kashyap, Narayana D.
core   +1 more source

New method of colour image encryption using triple chaotic maps

open access: yesIET Image Processing, Volume 18, Issue 12, Page 3262-3276, 16 October 2024.
Initially, the plain image is decomposed into the RGB format. An individual chaotic map is used in the permutation and diffusion of each map to break the correlations in the plain image. Lorenz, 2D‐Logistic, and Henon maps are used in different orders and with different orders of channels, producing a cipher image with the properties of randomness and ...
Khalid M. Hosny   +5 more
wiley   +1 more source

More Accurate Differential Properties of LED64 and Midori64

open access: yesIACR Transactions on Symmetric Cryptology, 2018
In differential cryptanalysis, a differential is more valuable than the single trail belonging to it in general. The traditional way to compute the probability of the differential is to sum the probabilities of all trails within it.
Ling Sun, Wei Wang, Meiqin Wang
doaj   +1 more source

Construction of secure adaptive frequency hopping sequence sets based on AES algorithm

open access: yesIET Communications, Volume 18, Issue 8, Page 490-502, May 2024.
This paper leverages the advanced encryption standard algorithm to explore the construction of secure frequency hopping (FH) sequences and proposes two mapping methods tailored to scenarios where the number of frequency slots is either an integer power of two or not. The proposed FH sequence sets constructed via these methods exhibit adaptability to an
Dongpo Song   +3 more
wiley   +1 more source

Doubly Perfect Nonlinear Boolean Permutations

open access: yes, 2010
Due to implementation constraints the XOR operation is widely used in order to combine plaintext and key bit-strings in secret-key block ciphers. This choice directly induces the classical version of the differential attack by the use of XOR-kind ...
Biham E.   +10 more
core   +3 more sources

ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
In this work, we introduce ToFA, the first fault attack (FA) strategy that attempts to leverage the classically well-known idea of impossible differential cryptanalysis to mount practically verifiable attacks on bit-oriented ciphers like GIFT and ...
Anup Kumar Kundu   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy