Results 31 to 40 of about 144 (105)
A Novel Image Encryption Scheme Based on PWLCM and Standard Map
In the past decades, considerable attention has been paid to the chaos‐based image encryption schemes owing to their characteristics such as extreme sensitivity to initial conditions and parameters, pseudo‐randomness, and unpredictability. However, some schemes have been proven to be insecure due to using a single chaotic system.
Yucheng Chen +3 more
wiley +1 more source
Cryptographic Strength Evaluation of Key Schedule Algorithms
Key schedule algorithms play an important role in modern encryption algorithms, and their security is as crucial as the security of the encryption algorithms themselves. Many studies have been performed on the cryptographic strength evaluation of the encryption algorithms; however, strength evaluation of the key schedule algorithms often obtains less ...
Shazia Afzal +5 more
wiley +1 more source
Cryptosystem Identification Scheme Based on ASCII Code Statistics
In the field of information security, block cipher is widely used in the protection of messages, and its safety naturally attracts people’s attention. The identification of the cryptosystem is the premise of encrypted data analysis. It belongs to the category of attack analysis in cryptanalysis and has important theoretical significance and application
Wenyu Zhang +3 more
wiley +1 more source
Improved Conditional Differential Analysis on NLFSR‐Based Block Cipher KATAN32 with MILP
In this paper, a new method for constructing a Mixed Integer Linear Programming (MILP) model on conditional differential cryptanalysis of the nonlinear feedback shift register‐ (NLFSR‐) based block ciphers is proposed, and an approach to detecting the bit with a strongly biased difference is provided.
Zhaohui Xing +3 more
wiley +1 more source
The increasing adoption of artificial intelligence (AI)‐driven unmanned aerial vehicles (UAVs) in military, commercial, and surveillance operations has introduced significant security challenges, including cyber threats, adversarial AI attacks, and communication vulnerabilities. This paper presents a comprehensive review of the key security threats and
Deafallah Alsadie, Jiwei Tian
wiley +1 more source
Image encryption schemes are predominantly software‐based. Only a select few have been implemented in real‐life communication systems. This paper introduces a novel chaotic image encryption scheme based on a modified Z‐order curve, a modified Josephus problem, and an improved Vigenère cipher–based ribonucleic acid (RNA) operation. It is implemented and
S. B. Nono Fotso +5 more
wiley +1 more source
Analysis of DES Plaintext Recovery Based on BP Neural Network
Backpropagation neural network algorithms are one of the most widely used algorithms in the current neural network algorithm. It uses the output error rate to estimate the error rate of the direct front layer of the output layer, so that we can get the error rate of each layer through the layer‐by‐layer backpropagation.
Sijie Fan, Yaqun Zhao, Leonel Sousa
wiley +1 more source
Random embedded calibrated statistical blind steganalysis using cross validated support vector machine and support vector machine with particle swarm optimization. [PDF]
Shankar DD, Azhakath AS.
europepmc +1 more source
Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm. [PDF]
Chang X +4 more
europepmc +1 more source
A Novel Color Image Encryption Scheme Based on Hyperchaos and Hopfield Chaotic Neural Network. [PDF]
Wu Y +5 more
europepmc +1 more source

