Articles with "cipher" as a keyword



Photo by usgs from unsplash

A new efficient lightweight and secure image cipher scheme

Sign Up to like & get
recommendations!
Published in 2017 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-017-5124-9

Abstract: The protection of multimedia content has become a key area of research, since very often a user’s privacy and confidentiality can be at risk. Although a large number of image encryption algorithms have recently emerged,… read more here.

Keywords: image; efficient lightweight; lightweight secure; secure image ... See more keywords
Photo by markusspiske from unsplash

Efficient and secure cipher scheme for multimedia contents

Sign Up to like & get
recommendations!
Published in 2018 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-018-6845-0

Abstract: The impact of confidentiality and privacy breaches are more pronounced when dealing with multimedia contents. One of the obvious techniques to counter these threats is the use of encryption. A number of algorithms for robust… read more here.

Keywords: error; multimedia contents; cipher scheme; multimedia ... See more keywords
Photo from wikipedia

A novel chaos-based approach in conjunction with MR-SVD and pairing function for generating visually meaningful cipher images

Sign Up to like & get
recommendations!
Published in 2020 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-020-09034-x

Abstract: For secure transmission of digital images, existing cryptographic algorithms transform images into a noise-like appearance. One obvious inference that an adversary could draw is that the noise-like texture is a cipher, prompting to apply classical… read more here.

Keywords: image; meaningful cipher; pairing function; visually meaningful ... See more keywords
Photo from wikipedia

Design and evaluation of countermeasures against fault injection attacks and power side-channel leakage exploration for AES block cipher

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3183764

Abstract: Differential Fault Analysis (DFA) and Power Analysis (PA) attacks, have become the main methods for exploiting the vulnerabilities of physical implementations of block ciphers, currently used in a multitude of applications, such as the Advanced… read more here.

Keywords: cipher; block cipher; power; dfa ... See more keywords
Photo by miracleday from unsplash

An Extended Type-1 Generalized Feistel Networks: Lightweight Block Cipher for IoT

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3126317

Abstract: In the last few years, a large amount of private and sensitive data generated by Internet of Things (IoT) devices need to be transmitted, stored, and processed in security, which become a serve challenge because… read more here.

Keywords: cipher; generalized feistel; feistel networks; lightweight block ... See more keywords
Photo from wikipedia

Self-Synchronized Encryption for Physical Layer in 10Gbps Optical Links

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Transactions on Computers"

DOI: 10.1109/tc.2018.2890259

Abstract: In this work a new self-synchronized encryption method for 10 Gigabit optical links is proposed and developed. Necessary modifications to introduce this kind of encryption in physical layers based on 64b/66b encoding, such as 10… read more here.

Keywords: cipher; self synchronized; synchronized encryption; optical links ... See more keywords
Photo by joelfilip from unsplash

Automatic Characterization of Exploitable Faults: A Machine Learning Approach

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2018.2868245

Abstract: Characterizing the fault space of a cipher to filter out a set of faults potentially exploitable for fault attacks (FA), is a problem with immense practical value. A quantitative knowledge of the exploitable fault space… read more here.

Keywords: fault space; characterization; cipher; exploitable fault ... See more keywords
Photo by bhargavpanchal1986 from unsplash

Conditional TMDTO as a MILP Instance

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Information Theory"

DOI: 10.1109/tit.2022.3230910

Abstract: Conditional Time-Memory-Data Trade-off (TMDTO) attack given by Biryukov and Shamir can be reduced to the following problem: “Find the minimum number of state bits that should be fixed in order to recover the maximum number… read more here.

Keywords: cipher; tmdto; state bits; stream ... See more keywords
Photo from wikipedia

Primitivity of the group of a cipher involving the action of the key-schedule

Sign Up to like & get
recommendations!
Published in 2020 at "Journal of Algebra and Its Applications"

DOI: 10.1142/s0219498821500845

Abstract: The algebraic structure of the group generated by the encryption functions of a block cipher depends on the key schedule algorithm used for generating the round keys. For such a reason, in general, studying this… read more here.

Keywords: cipher; group; key schedule; primitivity group ... See more keywords
Photo from wikipedia

Block Cipher's Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knight's Tour Chain

Sign Up to like & get
recommendations!
Published in 2022 at "Computational Intelligence and Neuroscience"

DOI: 10.1155/2022/8338508

Abstract: The protection of confidential information is a global issue, and block encryption algorithms are the most reliable option for securing data. The famous information theorist, Claude Shannon, has given two desirable characteristics that should exist… read more here.

Keywords: acoustics; cipher; substitution; box ... See more keywords
Photo by lgnwvr from unsplash

Multi-dimensional cubic symmetric block cipher algorithm for encrypting big data

Sign Up to like & get
recommendations!
Published in 2020 at "Bulletin of Electrical Engineering and Informatics"

DOI: 10.11591/eei.v9i6.2475

Abstract: The advanced technology in the internet and social media, communication companies, health care records and cloud computing applications made the data around us increase dramatically every minute and continuously. These renewals big data involve sensitive… read more here.

Keywords: multi dimensional; cipher; block; dimensional cubic ... See more keywords