Results 71 to 80 of about 9,453 (199)

Differential Fault Attacks on Privacy Protocols Friendly Symmetric‐Key Primitives: RAIN and HERA

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
As the practical applications of fully homomorphic encryption (FHE), secure multi‐party computation (MPC) and zero‐knowledge (ZK) proof continue to increase, so does the need to design and analyze new symmetric‐key primitives that can adapt to these privacy‐preserving protocols.
Lin Jiao   +4 more
wiley   +1 more source

Chaotic Image Encryption Scheme Based on Improved Z‐Order Curve, Modified Josephus Problem, and RNA Operations: An Experimental Li‐Fi Approach

open access: yesComplexity, Volume 2024, Issue 1, 2024.
Image encryption schemes are predominantly software‐based. Only a select few have been implemented in real‐life communication systems. This paper introduces a novel chaotic image encryption scheme based on a modified Z‐order curve, a modified Josephus problem, and an improved Vigenère cipher–based ribonucleic acid (RNA) operation. It is implemented and
S. B. Nono Fotso   +5 more
wiley   +1 more source

FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION [PDF]

open access: yesICTACT Journal on Communication Technology, 2010
In this paper, a novel encryption scheme with time based key technique on an FPGA is presented. Time based key technique ensures right key to be entered at right time and hence, vulnerability of encryption through brute force attack is eliminated ...
B. Lakshmi, E. Kirubakaran, T.N.Prabakar
doaj  

Cryptanalysis of QARMAv2

open access: yesIACR Transactions on Symmetric Cryptology
QARMAv2 is a general-purpose and hardware-oriented family of lightweight tweakable block ciphers (TBCs) introduced in ToSC 2023. QARMAv2, as a redesign of QARMAv1 with a longer tweak and tighter security margins, is also designed to be suitable for ...
Hosein Hadipour, Yosuke Todo
doaj   +1 more source

Impossible Differential Cryptanalysis of 16/18-Round Khudra

open access: yes, 2017
Khudra is a recently proposed lightweight block cipher specifically dedicated for Field Programmable Gate Arrays (FPGAs) implementation. It is a 4-branch type-2 generalized Feistel structure (GFS) of 18 rounds with 64-bit block size and 80-bit security margin. This paper studies the security of Khudra against impossible differential cryptanalysis.
Oguzhan Ersoy   +4 more
openaire   +3 more sources

Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs

open access: yesIACR Transactions on Symmetric Cryptology
The impossible differential (ID) attack is one of the most important cryptanalytic techniques for block ciphers. There are two phases to finding an ID attack: searching for the distinguisher and building a key recovery upon it.
Debasmita Chakraborty   +3 more
doaj   +1 more source

Deep-Learning-Based Cryptanalysis of Lightweight Block Ciphers Revisited. [PDF]

open access: yesEntropy (Basel), 2023
Kim H   +6 more
europepmc   +1 more source

New Results on Impossible Differential Cryptanalysis of Reduced–Round Camellia–128 [PDF]

open access: bronze, 2009
Hamid Mala   +3 more
openalex   +1 more source

Home - About - Disclaimer - Privacy