Results 31 to 40 of about 435,325 (313)

Transparency order versus confusion coefficient: a case study of NIST lightweight cryptography S-Boxes

open access: yesCybersecurity, 2021
Side-channel resistance is nowadays widely accepted as a crucial factor in deciding the security assurance level of cryptographic implementations. In most cases, non-linear components (e.g.
Huizhong Li   +4 more
doaj   +1 more source

Construction of Optimized Dynamic S-Boxes Based on a Cubic Modular Transform and the Sine Function

open access: yesIEEE Access, 2021
The protection of sensitive data from illegitimate users is one of the main challenges in today’s technological era. To handle prevailing security-related problems and challenges amicably, cryptographic techniques are applied for the fortification
Amjad Hussain Zahid   +6 more
doaj   +1 more source

A Novel Construction of Efficient Substitution-Boxes Using Cubic Fractional Transformation

open access: yesEntropy, 2019
A symmetric block cipher employing a substitution–permutation duo is an effective technique for the provision of information security. For substitution, modern block ciphers use one or more substitution boxes (S-Boxes).
Amjad Hussain Zahid   +2 more
doaj   +1 more source

KLEIN: A New Family of Lightweight Block Ciphers [PDF]

open access: yes, 2010
Resource-efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes.
A. Bogdanov   +39 more
core   +6 more sources

Analyses of Reconfigurable Chaotic Systems and their Cryptographic S-box Design Applications

open access: yesChaos Theory and Applications, 2023
This manuscript includes the design and evaluation of the new four 16×16 S-boxes for subbyte operation in image encryption applications and estimates their strength using the following parameters: Dynamic Distance, BIC non-linearity, Bijective, Non ...
Mangal Deep Gupta   +2 more
doaj  

PEIGEN – a Platform for Evaluation, Implementation, and Generation of S-boxes

open access: yesIACR Transactions on Symmetric Cryptology, 2019
In this paper, a platform named PEIGEN is presented to evaluate security, find efficient software/hardware implementations, and generate cryptographic S-boxes.
Zhenzhen Bao   +3 more
doaj   +1 more source

Improved Objective Functions to Search for 8 × 8 Bijective S-Boxes With Theoretical Resistance Against Power Attacks Under Hamming Leakage Models

open access: yesIEEE Access, 2022
Many research focuses on finding S-boxes with good cryptographic properties applying a heuristic method and a balanced, objective function. The design of S-boxes with theoretical resistance against Side-Channel Attacks by power consumption is addressed ...
Ismel Martinez-Diaz   +4 more
doaj   +1 more source

Nonlinearities of S-boxes

open access: yesFinite Fields and Their Applications, 2007
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Carlet, Claude, Ding, Cunsheng
openaire   +3 more sources

Image Encryption Using Elliptic Curves and Rossby/Drift Wave Triads

open access: yes, 2020
We propose an image encryption scheme based on quasi-resonant Rossby/drift wave triads (related to elliptic surfaces) and Mordell elliptic curves (MECs).
Bustamante, Miguel D.   +2 more
core   +1 more source

Survey and Benchmark of Block Ciphers for Wireless Sensor Networks [PDF]

open access: yes, 2006
Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without ...
Doumen, J.M., Hartel, P.H., Law, Y.W.
core   +3 more sources

Home - About - Disclaimer - Privacy