Results 31 to 40 of about 435,325 (313)
Side-channel resistance is nowadays widely accepted as a crucial factor in deciding the security assurance level of cryptographic implementations. In most cases, non-linear components (e.g.
Huizhong Li +4 more
doaj +1 more source
Construction of Optimized Dynamic S-Boxes Based on a Cubic Modular Transform and the Sine Function
The protection of sensitive data from illegitimate users is one of the main challenges in today’s technological era. To handle prevailing security-related problems and challenges amicably, cryptographic techniques are applied for the fortification
Amjad Hussain Zahid +6 more
doaj +1 more source
A Novel Construction of Efficient Substitution-Boxes Using Cubic Fractional Transformation
A symmetric block cipher employing a substitution–permutation duo is an effective technique for the provision of information security. For substitution, modern block ciphers use one or more substitution boxes (S-Boxes).
Amjad Hussain Zahid +2 more
doaj +1 more source
KLEIN: A New Family of Lightweight Block Ciphers [PDF]
Resource-efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes.
A. Bogdanov +39 more
core +6 more sources
Analyses of Reconfigurable Chaotic Systems and their Cryptographic S-box Design Applications
This manuscript includes the design and evaluation of the new four 16×16 S-boxes for subbyte operation in image encryption applications and estimates their strength using the following parameters: Dynamic Distance, BIC non-linearity, Bijective, Non ...
Mangal Deep Gupta +2 more
doaj
PEIGEN – a Platform for Evaluation, Implementation, and Generation of S-boxes
In this paper, a platform named PEIGEN is presented to evaluate security, find efficient software/hardware implementations, and generate cryptographic S-boxes.
Zhenzhen Bao +3 more
doaj +1 more source
Many research focuses on finding S-boxes with good cryptographic properties applying a heuristic method and a balanced, objective function. The design of S-boxes with theoretical resistance against Side-Channel Attacks by power consumption is addressed ...
Ismel Martinez-Diaz +4 more
doaj +1 more source
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Carlet, Claude, Ding, Cunsheng
openaire +3 more sources
Image Encryption Using Elliptic Curves and Rossby/Drift Wave Triads
We propose an image encryption scheme based on quasi-resonant Rossby/drift wave triads (related to elliptic surfaces) and Mordell elliptic curves (MECs).
Bustamante, Miguel D. +2 more
core +1 more source
Survey and Benchmark of Block Ciphers for Wireless Sensor Networks [PDF]
Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without ...
Doumen, J.M., Hartel, P.H., Law, Y.W.
core +3 more sources

