Results 31 to 40 of about 1,018 (121)

Multidimensional zero‐correlation linear cryptanalysis of lightweight block cipher Piccolo‐128 [PDF]

open access: yesSecurity and Communication Networks, 2016
AbstractPiccolo is a lightweight block cipher proposed at CHES 2011. This paper firstly gives the zero‐correlation linear approximations over 7‐round Piccolo and studies the security of Piccolo‐128 against multidimensional zero‐correlation linear cryptanalysis. Based on the statistic used in multidimensional linear cryptanalysis to detect the right key
Li‐shi Fu   +2 more
openaire   +1 more source

An intelligent information forwarder for healthcare big data systems with distributed wearable sensors [PDF]

open access: yes, 2014
© 2016 IEEE. An increasing number of the elderly population wish to live an independent lifestyle, rather than rely on intrusive care programmes. A big data solution is presented using wearable sensors capable of carrying out continuous monitoring of the
Jiang, Ping   +6 more
core   +1 more source

Multi-dimensional key generation of ICMetrics for cloud computing [PDF]

open access: yes, 2015
Despite the rapid expansion and uptake of cloud based services, lack of trust in the provenance of such services represents a significant inhibiting factor in the further expansion of such service.
Haciosman, Mustafa   +3 more
core   +2 more sources

A Key Selected S‐Box Mechanism and Its Investigation in Modern Block Cipher Design

open access: yesSecurity and Communication Networks, Volume 2020, Issue 1, 2020., 2020
The block cipher is an important means to provide data confidentiality in reality, and the S‐box is an essential part in most of modern block cipher designs. In 1973, Feistel used a key selected S‐box mechanism in his early block cipher designs, whose idea is to let each S‐box have two different states and use a key bit to select which of the two ...
Jiqiang Lu, Hwajung Seo, Kaitai Liang
wiley   +1 more source

A Novel Image Encryption Scheme Based on PWLCM and Standard Map

open access: yesComplexity, Volume 2020, Issue 1, 2020., 2020
In the past decades, considerable attention has been paid to the chaos‐based image encryption schemes owing to their characteristics such as extreme sensitivity to initial conditions and parameters, pseudo‐randomness, and unpredictability. However, some schemes have been proven to be insecure due to using a single chaotic system.
Yucheng Chen   +3 more
wiley   +1 more source

Cryptographic Strength Evaluation of Key Schedule Algorithms

open access: yesSecurity and Communication Networks, Volume 2020, Issue 1, 2020., 2020
Key schedule algorithms play an important role in modern encryption algorithms, and their security is as crucial as the security of the encryption algorithms themselves. Many studies have been performed on the cryptographic strength evaluation of the encryption algorithms; however, strength evaluation of the key schedule algorithms often obtains less ...
Shazia Afzal   +5 more
wiley   +1 more source

Polynomial-Time Amoeba Neighborhood Membership and Faster Localized Solving [PDF]

open access: yes, 2013
We derive efficient algorithms for coarse approximation of algebraic hypersurfaces, useful for estimating the distance between an input polynomial zero set and a given query point. Our methods work best on sparse polynomials of high degree (in any number
A. Dickenstein   +35 more
core   +1 more source

Cryptosystem Identification Scheme Based on ASCII Code Statistics

open access: yesSecurity and Communication Networks, Volume 2020, Issue 1, 2020., 2020
In the field of information security, block cipher is widely used in the protection of messages, and its safety naturally attracts people’s attention. The identification of the cryptosystem is the premise of encrypted data analysis. It belongs to the category of attack analysis in cryptanalysis and has important theoretical significance and application
Wenyu Zhang   +3 more
wiley   +1 more source

Improved Conditional Differential Analysis on NLFSR‐Based Block Cipher KATAN32 with MILP

open access: yesWireless Communications and Mobile Computing, Volume 2020, Issue 1, 2020., 2020
In this paper, a new method for constructing a Mixed Integer Linear Programming (MILP) model on conditional differential cryptanalysis of the nonlinear feedback shift register‐ (NLFSR‐) based block ciphers is proposed, and an approach to detecting the bit with a strongly biased difference is provided.
Zhaohui Xing   +3 more
wiley   +1 more source

Towards a spectral approach for the design of self-synchronizing stream ciphers [PDF]

open access: yes, 2010
International audienceThis paper addresses the problem of characterizing the func- tions that can be used in the design of self-synchronizing stream ciphers. We propose a general framework based on a spectral characterization through correlation matrices
Guillot, Philippe   +2 more
core   +3 more sources

Home - About - Disclaimer - Privacy