Results 81 to 90 of about 13,259 (191)

On the Embedded of a Fast, Light and Robust Chaos‐Based Cryptosystem in NEXYS4 FPGA Card for Real Time Color Image Security (CBC in N‐FPGA‐RTCIP)

open access: yesEngineering Reports, Volume 7, Issue 9, September 2025.
Security evaluation, NPCR + UACI results of 99.5978% and 33.4549% respectively, confirm the system is secure against statistical and differential attacks. Besides, the FPGA implementation achieves low power of 115 mW at a speed of 42.56 MHz. This makes it suitable for IoT applications where power and hardware resources are constrained. ABSTRACT In this
Fritz Nguemo Kemdoum   +4 more
wiley   +1 more source

Survey on approaches of stream cipher cryptanalysis

open access: yesTongxin xuebao, 2022
Cryptanalysis plays an essential role in the design of ciphers algorithm.Based on this, the common approaches were reviewed and investigated to clarify their relations.These approaches were categorized into four classes according to their main techniques,
Zhaocun ZHOU, Dengguo FENG
doaj   +2 more sources

Linear cryptanalysis of pseudorandom functions [PDF]

open access: yes, 2015
Relatório de projeto de pesquisa.In this paper, we study linear relations propagating across block ciphers from the key input to the ciphertext (for a fixed plaintext block).
Freitas, Daniel Santana de   +2 more
core  

Combining Real‐World and Clinical Trial Data Through Privacy‐Preserving Record Linkage: Opportunities and Challenges—A Narrative Review

open access: yesHealth Science Reports, Volume 8, Issue 9, September 2025.
ABSTRACT Background and Aims Despite their widespread use, randomized clinical trials (RCTs) face challenges like differential loss to follow‐up, which can impact validity. Real‐world evidence (RWE) from real‐world data (RWD) is increasingly used to address these limitations, but RCTs and RWE have provided complementary, disconnected observations of ...
Michael Batech   +7 more
wiley   +1 more source

Automated Risk‐Based Cryptoperiod Calculation in ICSs: Analytical Framework and Software Tool

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 5, September/October 2025.
ABSTRACT Internal network and system reconnaissance is one of the first crucial stages of most cyber attacks, though it plays an especially important role in attacks on complex industrial control systems (ICSs) that span both IT and OT environments. Frequently, besides device enumeration and scanning, a malicious ICS reconnaissance campaign will also ...
Gabriele Cianfarani   +2 more
wiley   +1 more source

Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming

open access: yes, 2012
Differential and linear cryptanalysis are two of the most powerful techniques to analyze symmetric-key primitives. For modern ciphers, resistance against these attacks is therefore a mandatory design criterion. In this paper, we propose a novel technique to prove security bounds against both differential and linear cryptanalysis.
Mouha, Nicky   +3 more
openaire   +2 more sources

Linear Cryptanalysis Using Multiple Approximations [PDF]

open access: yes, 1994
We present a technique which aids in the linear cryptanalysis of a block cipher and allows for a reduction in the amount of data required for a successful attack. We note the limits of this extension when applied to DES, but illustrate that it is generally applicable and might be exceptionally successful when applied to other block ciphers. This forces
Burton S. Kaliski, M. J. B. Robshaw
openaire   +1 more source

Generating Graphs Packed with Paths Estimation of Linear Approximations and Differentials

open access: yesIACR Transactions on Symmetric Cryptology, 2018
When designing a new symmetric-key primitive, the designer must show resistance to known attacks. Perhaps most prominent amongst these are linear and differential cryptanalysis. However, it is notoriously difficult to accurately demonstrate e.g.
Mathias Hall-Andersen, Philip S. Vejre
doaj   +1 more source

Algebraic Techniques in Linear Cryptanalysis

open access: yesProceedings of the 2012 2nd International Conference on Computer and Information Applications (ICCIA 2012), 2012
Linear cryptanalysis is a statistical analysis method. Linear cryptanalysis constructs probabilistic patterns first and then distinguishes the cipher from a random permutation using lots of plaintext-ciphertext pairs. Linear cryptanalysis has a big data complexity. Algebraic attack attempts to exploit the algebraic structure of the cipher by expressing
Hong Ru Wei, Ya Fei Zheng
openaire   +2 more sources

XSL Block Ciphers’ Key-schedules with Resistance to Differential Cryptanalysis

open access: yesБезопасность информационных технологий, 2014
The paper discusses the resistance of XSL block ciphers to differential cryptanalysis. AES-like block ciphers with alternative key-schedules (increased performance and density) are given as an example.
Marina Aleksandrovna Pudovkina   +1 more
doaj  

Home - About - Disclaimer - Privacy