Results 91 to 100 of about 4,106,080 (244)

Detailed Assessment of Hardware Implementations, Attacks and Countermeasures for the Ascon Authenticated Cipher

open access: yesElectronics Letters, Volume 61, Issue 1, January/December 2025.
ASCON has been selected by the National Institute of Standards and Technology (NIST) as the new authenticated cipher for lightweight environments. This paper analyses ASCON's hardware (HW) security through its HW implementation schemes, successful HW attacks and the proposed HW countermeasures against them, aiming to serve as a starting point for ...
Miguel Martín‐González   +3 more
wiley   +1 more source

Cryptanalyzing a discrete-time chaos synchronization secure communication system

open access: yes, 2003
This paper describes the security weakness of a recently proposed secure communication method based on discrete-time chaos synchronization. We show that the security is compromised even without precise knowledge of the chaotic system used.
Alligood   +22 more
core   +1 more source

A DNA‐Dynamic Permutation‐Diffusion Algorithm for Image Encryption Using Scaling Chaotification Models and Advanced DNA Operations

open access: yesIET Image Processing, Volume 19, Issue 1, January/December 2025.
This paper proposes a DNA‐Dynamic Concurrent Permutation‐Diffusion Algorithm (DNA‐DCP‐DA) for secure image encryption, employing novel scaling chaotification models and advanced noncommutative DNA operations to address weaknesses in existing systems.
Mustafa Kamil Khairullah   +5 more
wiley   +1 more source

Group theory in cryptography [PDF]

open access: yes, 2010
This paper is a guide for the pure mathematician who would like to know more about cryptography based on group theory. The paper gives a brief overview of the subject, and provides pointers to good textbooks, key research papers and recent survey papers ...
Blackburn, Simon R.   +2 more
core  

Cybersecurity and Artificial Intelligence in Unmanned Aerial Vehicles: Emerging Challenges and Advanced Countermeasures

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The increasing adoption of artificial intelligence (AI)‐driven unmanned aerial vehicles (UAVs) in military, commercial, and surveillance operations has introduced significant security challenges, including cyber threats, adversarial AI attacks, and communication vulnerabilities. This paper presents a comprehensive review of the key security threats and
Deafallah Alsadie, Jiwei Tian
wiley   +1 more source

Dynamic MDS Matrices for Substantial Cryptographic Strength [PDF]

open access: yes, 2011
Ciphers get their strength from the mathematical functions of confusion and diffusion, also known as substitution and permutation. These were the basics of classical cryptography and they are still the basic part of modern ciphers.
Malik, Muhammad Yasir, No, Jong-Seon
core   +2 more sources

Cryptanalysis of Keyword Confidentiality in a Searchable Public‐Key Encryption Scheme Against Malicious Server

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Public‐key authenticated encryption with keyword search (PAEKS) is a novel cryptographic primitive to resist against keyword‐guessing attacks (KGAs) and preserve the privacy of keywords in both ciphertexts and trapdoors. Recently, a designated‐server PAEKS (dPAEKS) scheme was proposed to withstand KGAs.
Nan Zhang   +3 more
wiley   +1 more source

Survey on approaches of stream cipher cryptanalysis

open access: yesTongxin xuebao, 2022
Cryptanalysis plays an essential role in the design of ciphers algorithm.Based on this, the common approaches were reviewed and investigated to clarify their relations.These approaches were categorized into four classes according to their main techniques,
Zhaocun ZHOU, Dengguo FENG
doaj   +2 more sources

Image Encryption using Linear Cryptanalysis and different Fuzzy operations

open access: yesInternational Journal of Scientific Research in Computer Science and Engineering, 2018
Accepted: 19/Aug/2018, Online: 31/Aug/2018 Abstract — Nowadays, the security of digital image is one of the most essential terms. In this article, a piecewise linear chaotic map based image encryption has been proposed. For implementation protection from
D. Dey
semanticscholar   +1 more source

Yoyo Cryptanalysis Against Reduced‐Round L‐Feistel Structure for Recovering the Secret Components

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
L‐Feistel structure is a new iterative block cipher structure and unifies the Feistel structure and the Lai–Massey structure while maintaining the similarity of encryption and decryption. In this study, we present the first yoyo cryptanalysis against the L‐Feistel structure to evaluate the security under structural attack and give the method to recover
Jiyan Zhang   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy