Results 71 to 80 of about 13,259 (191)
Regular subgroups with large intersection
In this paper we study the relationships between the elementary abelian regular subgroups and the Sylow $2$-subgroups of their normalisers in the symmetric group $\mathrm{Sym}(\mathbb{F}_2^n)$, in view of the interest that they have recently raised for ...
Aragona, Riccardo +3 more
core +1 more source
A connection between cryptography and polynomial functions is extremely significant. Mathematical performance of polynomials helps to enhance the cryptographic primitives, which are trustworthy as well as straightforward representation tools, in everyday use. In this research, explicit topological sequences Qf which correspond to degree‐based, distance‐
Mohammad Mazyad Hazzazi +5 more
wiley +1 more source
Separable Statistics and Multidimensional Linear Cryptanalysis
Multidimensional linear cryptanalysis of block ciphers is improved in this work by introducing a number of new ideas. Firstly, formulae is given to compute approximate multidimensional distributions of the encryption algorithm internal bits. Conventional
Stian Fauskanger, Igor Semaev
doaj +1 more source
Cryptanalyzing a discrete-time chaos synchronization secure communication system
This paper describes the security weakness of a recently proposed secure communication method based on discrete-time chaos synchronization. We show that the security is compromised even without precise knowledge of the chaotic system used.
Alligood +22 more
core +1 more source
A Secure and Robust Blockchain‐Based Medical Image Encryption Approach Using Lorenz Chaotic System
Keeping medical images confidential while transmitting is crucial, especially in an open networking environment. One effective approach is blockchain‐based encryption, which provides strong security for sensitive healthcare data. To ensure the greatest levels of medical data integrity and authenticity, our proposed scheme employs a unique Lorenz ...
Fahima Hajjej +4 more
wiley +1 more source
Improved Linear Cryptanalysis of SOSEMANUK [PDF]
The SOSEMANUK stream cipher is one of the finalists of the eSTREAM project. In this paper, we improve the linear cryptanalysis of SOSEMANUK presented in Asiacrypt 2008. We apply the generalized linear masking technique to SOSEMANUK and derive many linear approximations holding with the correlations of up to 2-25.5.
Joo Yeon Cho, Miia Hermelin
openaire +3 more sources
Differential cryptanalysis and linear cryptanalysis are the two best-known cryptanalysis techniques for symmetric-key primitives. Ensuring resistance to these attacks is critical for the security of block ciphers.
Ting Peng, Wentao Zhang, Jingsui Weng
doaj +1 more source
Dynamic MDS Matrices for Substantial Cryptographic Strength [PDF]
Ciphers get their strength from the mathematical functions of confusion and diffusion, also known as substitution and permutation. These were the basics of classical cryptography and they are still the basic part of modern ciphers.
Malik, Muhammad Yasir, No, Jong-Seon
core +2 more sources
This work presents a secure telemedicine cryptosystem based on a novel 4D memristive chaotic oscillator and a Dispatched Gray Code Scrambler (DGCS). Implemented on FPGA, the system ensures power‐efficient encryption, making it suitable for real‐time medical image transmission in IoT healthcare environments.
Fritz Nguemo Kemdoum +3 more
wiley +1 more source
An Extended Analysis of the Correlation Extraction Algorithm in the Context of Linear Cryptanalysis
In cryptography, techniques and tools developed in the subfield of linear cryptanalysis have previously successfully been used to allow attackers to break many sophisticated cryptographic ciphers.
Christoph Graebnitz +5 more
doaj +1 more source

