Results 71 to 80 of about 3,178 (206)

MergeMAC:A MAC for Authentication with Strict Time Constraints and Limited Bandwidth [PDF]

open access: yes, 2018
This paper presents MergeMAC, a MAC that is particularly suitable for environments with strict time requirements and extremely limited bandwidth. MergeMAC computes the MAC by splitting the message into two parts.
Ankele, Ralph   +2 more
core   +2 more sources

Yoyo Cryptanalysis Against Reduced‐Round L‐Feistel Structure for Recovering the Secret Components

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
L‐Feistel structure is a new iterative block cipher structure and unifies the Feistel structure and the Lai–Massey structure while maintaining the similarity of encryption and decryption. In this study, we present the first yoyo cryptanalysis against the L‐Feistel structure to evaluate the security under structural attack and give the method to recover
Jiyan Zhang   +4 more
wiley   +1 more source

A Provably Secure Authentication Protocol Based on PUF and ECC for IoT Cloud‐Edge Environments

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The Internet of Things (IoT) cloud model provides an efficient scheme for rapid collection, storage, processing, and analysis of massive node data, and its application has gradually expanded to key areas such as healthcare and transportation. However, the security issues of open channel transmission in IoT still persist. Researchers have proposed a lot
Xiong Wang   +5 more
wiley   +1 more source

Non-Boolean almost perfect nonlinear functions on non-Abelian groups [PDF]

open access: yes, 2011
The purpose of this paper is to present the extended definitions and characterizations of the classical notions of APN and maximum nonlinear Boolean functions to deal with the case of mappings from a finite group K to another one N with the possibility ...
ALEXANDER POTT   +3 more
core   +4 more sources

NoLIEM: A Novel Lightweight Image Encryption Method for Resource‐Constrained IoT Devices

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The expanded use of Internet of Things (IoT) devices in smart homes, industrial automation, healthcare, and smart cities has increased the risk of unauthorized access, data breaches, and man‐in‐the‐middle attacks. Traditional encryption methods like AES and RSA are too energy‐ and processing‐intensive for IoT devices.
Athraa J. H. Witwit   +3 more
wiley   +1 more source

A Meaningful MD5 Hash Collision Attack [PDF]

open access: yes, 2006
It is now proved by Wang et al., that MD5 hash is no more secure, after they proposed an attack that would generate two different messages that gives the same MD5 sum. Many conditions need to be satisfied to attain this collision.
Kashyap, Narayana D.
core   +1 more source

A Novel Method of Data Protection Through DNA Chromosome Databases

open access: yesApplied Computational Intelligence and Soft Computing, Volume 2025, Issue 1, 2025.
With the advancement of the digital age, data have become insecure, which requires techniques to secure data. Deoxyribonucleic acid (DNA) has become an increasingly secure technology for storing next‐generation digital data. DNA provides superior capabilities due to its high and efficient storage capacity and long lifespan.
Sadoon Hussein   +2 more
wiley   +1 more source

More Accurate Differential Properties of LED64 and Midori64

open access: yesIACR Transactions on Symmetric Cryptology, 2018
In differential cryptanalysis, a differential is more valuable than the single trail belonging to it in general. The traditional way to compute the probability of the differential is to sum the probabilities of all trails within it.
Ling Sun, Wei Wang, Meiqin Wang
doaj   +1 more source

A Secure Way of Communication for Smart Grid Networks

open access: yesInternational Journal of Distributed Sensor Networks, Volume 2025, Issue 1, 2025.
In 2021, Khan et al. suggested a scheme based on smart grid networks. They deployed the random oracle model to justify the security of their scheme formally. They also verified the security of the scheme using the AVISPA software tool. We studied this scheme and found some security issues. The scheme suffers from a confidentiality breach attack.
Pooja Tyagi   +4 more
wiley   +1 more source

Doubly Perfect Nonlinear Boolean Permutations

open access: yes, 2010
Due to implementation constraints the XOR operation is widely used in order to combine plaintext and key bit-strings in secret-key block ciphers. This choice directly induces the classical version of the differential attack by the use of XOR-kind ...
Biham E.   +10 more
core   +3 more sources

Home - About - Disclaimer - Privacy