Results 11 to 20 of about 1,018 (121)
Multidimensional Differential-Linear Cryptanalysis of ARIA Block Cipher [PDF]
ARIA is a 128-bit block cipher that has been selected as a Korean encryption standard.
Wentan Yi, Jiongjiong Ren, Shaozhen Chen
openaire +3 more sources
Protecting Against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation [PDF]
The decorrelation theory provides a different point of view on the security of block cipher primitives. Results on some statistical attacks obtained in this context can support or provide new insight on the security of symmetric cryptographic primitives.
Céline Blondeau +2 more
exaly +6 more sources
Improved linear cryptanalysis on 25‐round SMS4
Abstract SMS4 is the Chinese national standard for WLAN, which is also an ISO/IEC international standard. This paper presents a linear cryptanalysis on 25‐round SMS4 for the first time. Firstly, this paper adopts a new statistic in linear cryptanalysis, which is aimed to compute the distance between one cipher system and one random permutation, which ...
Lishi Fu, Chenhui Jin
wiley +1 more source
A Systematic and Meta-Analysis Survey of Whale Optimization Algorithm. [PDF]
The whale optimization algorithm (WOA) is a nature‐inspired metaheuristic optimization algorithm, which was proposed by Mirjalili and Lewis in 2016. This algorithm has shown its ability to solve many problems. Comprehensive surveys have been conducted about some other nature‐inspired algorithms, such as ABC and PSO.
Mohammed HM, Umar SU, Rashid TA.
europepmc +2 more sources
Many cryptanalytic techniques for symmetric‐key primitives rely on specific statistical analysis to extract some secrete key information from a large number of known or chosen plaintext‐ciphertext pairs. For example, there is a standard statistical model for differential cryptanalysis that determines the success probability and complexity of the attack
Caibing WANG +3 more
wiley +1 more source
A Blockchain‐Based Verifiable User Data Access Control Policy for Secured Cloud Data Storage
Adding the adequate level of security of information systems dealing with sensitive data, privacy, or defense systems involves some form of access control. The audits performed are dealing with the determination of the allowed activities of the legal users, when attempting to access resources of the system.
Xinlong LI, Konstantinos Demertzis
wiley +1 more source
[Retracted] Deep Learning‐Based English‐Chinese Translation Research
Neural machine translation (NMT) has been bringing exciting news in the field of machine translation since its emergence. However, because NMT only employs single neural networks to convert natural languages, it suffers from two drawbacks in terms of reducing translation time: NMT is more sensitive to sentence length than statistical machine ...
Yao Huang, Yi Xin, Victor S. Sheng
wiley +1 more source
Fast and Robust Image Encryption Scheme Based on Quantum Logistic Map and Hyperchaotic System
Topic of quantum chaos has begun to draw increasing attention in recent years. So, to ensure the security of digital image, an image encryption algorithm based on combining a hyperchaotic system and quantum 3D logistic map is proposed. This algorithm is applied in four stages.
Nehal Abd El-Salam Mohamed +3 more
wiley +1 more source
Facial Expression Recognition and Beauty Health Management Based on Image Feature Analysis
Face recognition can convey a kind of intuitive and rich information to people. With the current Internet security problems becoming more and more prominent today, in order to better effectively guarantee the security of such digital images during Internet transmission, one of the most direct and effective solutions is to recognize the characteristics ...
Shanshan Fu, Binbin Xu, Shadi Aljawarneh
wiley +1 more source
Based on 5G wireless communication technology, this paper proposes a secure online banking payment scheme using a password algorithm and identity authentication+SMS verification code. We use the lightweight block cipher algorithm to construct a numeric permutation table.
Guo Jianluan +2 more
wiley +1 more source

