Results 71 to 80 of about 9,453 (199)
Differential Fault Attacks on Privacy Protocols Friendly Symmetric‐Key Primitives: RAIN and HERA
As the practical applications of fully homomorphic encryption (FHE), secure multi‐party computation (MPC) and zero‐knowledge (ZK) proof continue to increase, so does the need to design and analyze new symmetric‐key primitives that can adapt to these privacy‐preserving protocols.
Lin Jiao +4 more
wiley +1 more source
Image encryption schemes are predominantly software‐based. Only a select few have been implemented in real‐life communication systems. This paper introduces a novel chaotic image encryption scheme based on a modified Z‐order curve, a modified Josephus problem, and an improved Vigenère cipher–based ribonucleic acid (RNA) operation. It is implemented and
S. B. Nono Fotso +5 more
wiley +1 more source
FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION [PDF]
In this paper, a novel encryption scheme with time based key technique on an FPGA is presented. Time based key technique ensures right key to be entered at right time and hence, vulnerability of encryption through brute force attack is eliminated ...
B. Lakshmi, E. Kirubakaran, T.N.Prabakar
doaj
QARMAv2 is a general-purpose and hardware-oriented family of lightweight tweakable block ciphers (TBCs) introduced in ToSC 2023. QARMAv2, as a redesign of QARMAv1 with a longer tweak and tighter security margins, is also designed to be suitable for ...
Hosein Hadipour, Yosuke Todo
doaj +1 more source
Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis [PDF]
Makoto Sugita +2 more
openalex +1 more source
Impossible Differential Cryptanalysis of 16/18-Round Khudra
Khudra is a recently proposed lightweight block cipher specifically dedicated for Field Programmable Gate Arrays (FPGAs) implementation. It is a 4-branch type-2 generalized Feistel structure (GFS) of 18 rounds with 64-bit block size and 80-bit security margin. This paper studies the security of Khudra against impossible differential cryptanalysis.
Oguzhan Ersoy +4 more
openaire +3 more sources
A new distinguishing attack on reduced round ChaCha permutation. [PDF]
Dey C, Sarkar S.
europepmc +1 more source
The impossible differential (ID) attack is one of the most important cryptanalytic techniques for block ciphers. There are two phases to finding an ID attack: searching for the distinguisher and building a key recovery upon it.
Debasmita Chakraborty +3 more
doaj +1 more source
Deep-Learning-Based Cryptanalysis of Lightweight Block Ciphers Revisited. [PDF]
Kim H +6 more
europepmc +1 more source
New Results on Impossible Differential Cryptanalysis of Reduced–Round Camellia–128 [PDF]
Hamid Mala +3 more
openalex +1 more source

