Results 31 to 40 of about 144 (105)

A Novel Image Encryption Scheme Based on PWLCM and Standard Map

open access: yesComplexity, Volume 2020, Issue 1, 2020., 2020
In the past decades, considerable attention has been paid to the chaos‐based image encryption schemes owing to their characteristics such as extreme sensitivity to initial conditions and parameters, pseudo‐randomness, and unpredictability. However, some schemes have been proven to be insecure due to using a single chaotic system.
Yucheng Chen   +3 more
wiley   +1 more source

Cryptographic Strength Evaluation of Key Schedule Algorithms

open access: yesSecurity and Communication Networks, Volume 2020, Issue 1, 2020., 2020
Key schedule algorithms play an important role in modern encryption algorithms, and their security is as crucial as the security of the encryption algorithms themselves. Many studies have been performed on the cryptographic strength evaluation of the encryption algorithms; however, strength evaluation of the key schedule algorithms often obtains less ...
Shazia Afzal   +5 more
wiley   +1 more source

Cryptosystem Identification Scheme Based on ASCII Code Statistics

open access: yesSecurity and Communication Networks, Volume 2020, Issue 1, 2020., 2020
In the field of information security, block cipher is widely used in the protection of messages, and its safety naturally attracts people’s attention. The identification of the cryptosystem is the premise of encrypted data analysis. It belongs to the category of attack analysis in cryptanalysis and has important theoretical significance and application
Wenyu Zhang   +3 more
wiley   +1 more source

Improved Conditional Differential Analysis on NLFSR‐Based Block Cipher KATAN32 with MILP

open access: yesWireless Communications and Mobile Computing, Volume 2020, Issue 1, 2020., 2020
In this paper, a new method for constructing a Mixed Integer Linear Programming (MILP) model on conditional differential cryptanalysis of the nonlinear feedback shift register‐ (NLFSR‐) based block ciphers is proposed, and an approach to detecting the bit with a strongly biased difference is provided.
Zhaohui Xing   +3 more
wiley   +1 more source

Cybersecurity and Artificial Intelligence in Unmanned Aerial Vehicles: Emerging Challenges and Advanced Countermeasures

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The increasing adoption of artificial intelligence (AI)‐driven unmanned aerial vehicles (UAVs) in military, commercial, and surveillance operations has introduced significant security challenges, including cyber threats, adversarial AI attacks, and communication vulnerabilities. This paper presents a comprehensive review of the key security threats and
Deafallah Alsadie, Jiwei Tian
wiley   +1 more source

Chaotic Image Encryption Scheme Based on Improved Z‐Order Curve, Modified Josephus Problem, and RNA Operations: An Experimental Li‐Fi Approach

open access: yesComplexity, Volume 2024, Issue 1, 2024.
Image encryption schemes are predominantly software‐based. Only a select few have been implemented in real‐life communication systems. This paper introduces a novel chaotic image encryption scheme based on a modified Z‐order curve, a modified Josephus problem, and an improved Vigenère cipher–based ribonucleic acid (RNA) operation. It is implemented and
S. B. Nono Fotso   +5 more
wiley   +1 more source

Analysis of DES Plaintext Recovery Based on BP Neural Network

open access: yesSecurity and Communication Networks, Volume 2019, Issue 1, 2019., 2019
Backpropagation neural network algorithms are one of the most widely used algorithms in the current neural network algorithm. It uses the output error rate to estimate the error rate of the direct front layer of the output layer, so that we can get the error rate of each layer through the layer‐by‐layer backpropagation.
Sijie Fan, Yaqun Zhao, Leonel Sousa
wiley   +1 more source

Home - About - Disclaimer - Privacy