Results 21 to 30 of about 480,128 (291)
Construction of Substitution Boxes Using Finite Fields
Substitution boxes (S-boxes) play a crucial role in modern cryptographic algorithms, providingnon-linear transformations that enhance the security of data encryption. S-boxes are essentialcomponents of symmetric key ciphers, such as Advanced Encryption Standard (AES) and DataEncryption Standard (DES).
Naveed Ahmed Umrani +2 more
openaire +1 more source
Construction of S-Boxes Using Different Maps Over Elliptic Curves for Image Encryption
In this article, we present an encryption technique that can encrypt any digital data. The proposed scheme basically depends on a substitution-permutation network. Two separate bijective maps are used in the proposed algorithm.
Muhammad Ramzan +4 more
doaj +1 more source
A Novel Cryptographic Substitution Box Design Using Gaussian Distribution
In this paper, a novel method is being proposed to construct a substitution box or Boolean function for block ciphers using Gaussian distribution and linear fractional transform.
Muhammad Fahad Khan +2 more
doaj +1 more source
A Novel Image Encryption Scheme Based on Elliptic Curves over Finite Rings
Image encryption based on elliptic curves (ECs) is emerging as a new trend in cryptography because it provides high security with a relatively smaller key size when compared with well-known cryptosystems.
Umar Hayat +3 more
doaj +1 more source
Generating biometric random cryptographic key based on unique fingerprint features [PDF]
This paper uses the unique biometric features of fingerprints to generate random cryptographic keys. The main aspects of the security of the generated key include the privacy of the fingerprint and the randomness and complexity of the key generation ...
Bahram Rashidi, Ali Goudarzi
doaj +1 more source
Algebraic Construction of Powerful Substitution Box
The development of wireless transmission, day by day contacts the new statures of innovation. Cryptography is one of the procedures used to give security to information streaming over the system by encryption and decryption. Substitution box (S-box) is a one of a kind nonlinear activity in Advanced Encryption Standard (AES), this paper proposed a new ...
Eslam wahba afify* +3 more
openaire +1 more source
Campylobacter jejuni and Campylobacter coli are major food-borne pathogens that cause bacterial gastroenteritis in humans, and poultry is considered as their most important reservoir.
Yiluo Cheng +7 more
doaj +1 more source
Dual-Context Calculi for Modal Logic [PDF]
We present natural deduction systems and associated modal lambda calculi for the necessity fragments of the normal modal logics K, T, K4, GL and S4. These systems are in the dual-context style: they feature two distinct zones of assumptions, one of which
Kavvos, G. A.
core +4 more sources
A Novel Construction of Efficient Substitution-Boxes Using Cubic Fractional Transformation
A symmetric block cipher employing a substitution–permutation duo is an effective technique for the provision of information security. For substitution, modern block ciphers use one or more substitution boxes (S-Boxes).
Amjad Hussain Zahid +2 more
doaj +1 more source
Dynamic S-Box Design Using a Novel Square Polynomial Transformation and Permutation
New era ciphers employ substitution boxes (S-boxes) which assist in the provision of security for the plaintext in the encryption phase and transforming the ciphertext on the receiver side into original plaintext in the decryption phase.
Amjad Hussain Zahid +11 more
doaj +1 more source

