Results 21 to 30 of about 535 (102)
Impossible Differential Distinguishers of Two Generalized Feistel Structures
Generalized Feistel structures are widely used in the design of block ciphers. In this paper, we focused on retrieving impossible differentials for two kinds of generalized Feistel structures: CAST256‐like structure with Substitution‐Permutation (SP) or Substitution‐Permutation‐Substitution (SPS) round functions (named CAST256SP and CAST256SPS ...
Huili Wang +5 more
wiley +1 more source
Implementation of Direct Sequence Spread Spectrum Communication System Using FPGA [PDF]
This paper presents the designed and implementation of spread spectrum technology for data transfer to overcome the interference problems associated with narrow band, very high frequency and ultra high frequency data transfer systems. The spread spectrum
Karthick, N. (N) +3 more
core +1 more source
A Novel Approach to Communicate Secret Message Between Users Using Sponge Function Technique on NTRU [PDF]
This paper presents a novel approach for a (key distribution) for secret message communication among a group (G). In order to increase security to distribute secret message (key), we introduce sponge functions using these at a specific permutation.
Avadhani, P. S. (P) +2 more
core +2 more sources
Evolutionary approach to secure mobile telecommunication networks [PDF]
A series of encryption algorithms called A5 is used to secure mobile telephone communications, producing a pseudo-random sequence that will be exclusive OR (XORed) with the data flowing in the air interface in order to secure them.
Alipacha, Adda +2 more
core +3 more sources
Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression [PDF]
International audienceIn typical applications of homomorphic encryption, the first step consists for Alice to encrypt some plaintext m under Bob’s public key pk and to send the ciphertext c = HEpk(m) to some third-party evaluator Charlie.
Canteaut, Anne +6 more
core +6 more sources
Passive keyless entry and start system has been widely used in modern cars. Car owners can open the door or start the engine merely by having the key in their pocket. PKES was originally designed to establish a communication channel between the car and its key within approximately one meter.
Wonsuk Choi +3 more
wiley +1 more source
Analysis of the Time Series Generated by a New High‐Dimensional Discrete Chaotic System
The chaotic behavior of low‐dimensional digital chaotic systems is seriously degraded, and the output sequence has a short period. In this study, a digital sequence generator based on a high‐dimensional chaotic system is proposed to ensure performance and security.
Chuanfu Wang +5 more
wiley +1 more source
STP‐LWE: A Variant of Learning with Error for a Flexible Encryption
We construct a flexible lattice based scheme based on semitensor product learning with errors (STP‐LWE), which is a variant of learning with errors problem. We have proved that STP‐LWE is hard when LWE is hard. Our scheme is proved to be secure against indistinguishable chosen message attacks, and it can achieve a balance between the security and ...
Bo Gao +6 more
wiley +1 more source
Genetic Algorithms: A Technique For Cryptography Real Time Data Transmission [PDF]
The growing adoption of Internet for business applications has exposed users to unwanted risks andattacks. Now more than ever, we find individuals/corporate houses exchanging critical informationover the Internet.
Dubey, Sulakshana +2 more
core +2 more sources
Low Power Built‐In Self‐Test Schemes for Array and Booth Multipliers
Recent trends in IC technology have given rise to a new requirement, that of low power dissipation during testing, that Built‐In Self‐Test (BIST) structures must target along with the traditional requirements. To this end, by exploiting the inherent properties of Carry Save, Carry Propagate and modified Booth multipliers, in this paper we propose new ...
D. Bakalist +4 more
wiley +1 more source

