Results 31 to 40 of about 1,483,203 (289)

Image Encryption Using Elliptic Curves and Rossby/Drift Wave Triads

open access: yes, 2020
We propose an image encryption scheme based on quasi-resonant Rossby/drift wave triads (related to elliptic surfaces) and Mordell elliptic curves (MECs).
Bustamante, Miguel D.   +2 more
core   +1 more source

A Novel Construction of Substitution Box Based on Polynomial Mapped and Finite Field With Image Encryption Application

open access: yesIEEE Access, 2022
In the modern block cipher, the substitution box (S-box) is a nonlinear constituent that plays a substantial role to create the confusion in ciphertext. S-boxes with low value of differential uniformity and high value of nonlinearity are considered more ...
Abid Mahboob   +6 more
doaj   +1 more source

A Novel Algorithm of Constructing Highly Nonlinear S-p-boxes

open access: yesCryptography, 2019
The role of substitution boxes is very important in block ciphers. Substitution boxes are utilized to create confusion in the cryptosystem. However, to create both confusion and diffusion in any cryptosystem p-boxes and chaos base substitution boxes are ...
Yasir Naseer   +3 more
doaj   +1 more source

A Matrix PRNG with S-Box Output Filtering [PDF]

open access: yes, 2014
We describe a modification to a previously published pseudorandom number generator improving security while maintaining high performance. The proposed generator is based on the powers of a word-packed block upper triangular matrix and it is designed to ...
Alvarez, Rafael, Zamora, Antonio
core   +3 more sources

Biocidal Amidic Natural Products

open access: yesNatural Product Communications, 2008
Some of the more potent, and interesting, natural products that have marked biocidal properties have one, or more, amide functional groups. On the other hand, there are countless amides that are non-toxic.
Vernon G. S. Box
doaj   +1 more source

Boomerang Connectivity Table:A New Cryptanalysis Tool [PDF]

open access: yes, 2018
A boomerang attack is a cryptanalysis framework that regards a block cipher $E$ as the composition of two sub-ciphers $E_1\circ E_0$ and builds a particular characteristic for $E$ with probability $p^2q^2$ by combining differential characteristics for ...
A Biryukov   +21 more
core   +2 more sources

Nonlinearities of S-boxes

open access: yesFinite Fields and Their Applications, 2007
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Carlet, Claude, Ding, Cunsheng
openaire   +3 more sources

Boomerang uniformity of popular S-box constructions [PDF]

open access: yesDesigns, Codes and Cryptography, 2020
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Shizhu Tian   +2 more
openaire   +5 more sources

An Improved AES Cryptosystem Based Genetic Method on S-Box, With, 256 Key Sizes and 14-Rounds [PDF]

open access: yes, 2017
Cryptography methods are widely use in digital communication for secure data transaction. Cryptography methods have two categories symmetric and asymmetric. Both types of encrypting have their own importance and limitations.
Lilhore, U. K. (Umesh)   +1 more
core   +1 more source

A New Chaotic S-Box Generation Method Using Parameter Optimization of One Dimensional Chaotic Maps

open access: yesIEEE Access, 2019
Chaotic systems have been used to generate the substitutional box structures. The existence of endless possibilities for the selection of the initial conditions and control parameters of the chaotic system has made it a necessity to use the optimization ...
Erkan Tanyildizi, Fatih Ozkaynak
doaj   +1 more source

Home - About - Disclaimer - Privacy