Photo by usgs from unsplash
Sign Up to like & get
recommendations!
1
Published in 2017 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-017-5124-9
Abstract: The protection of multimedia content has become a key area of research, since very often a user’s privacy and confidentiality can be at risk. Although a large number of image encryption algorithms have recently emerged,…
read more here.
Keywords:
image;
efficient lightweight;
lightweight secure;
secure image ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-018-6845-0
Abstract: The impact of confidentiality and privacy breaches are more pronounced when dealing with multimedia contents. One of the obvious techniques to counter these threats is the use of encryption. A number of algorithms for robust…
read more here.
Keywords:
error;
multimedia contents;
cipher scheme;
multimedia ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-020-09034-x
Abstract: For secure transmission of digital images, existing cryptographic algorithms transform images into a noise-like appearance. One obvious inference that an adversary could draw is that the noise-like texture is a cipher, prompting to apply classical…
read more here.
Keywords:
image;
meaningful cipher;
pairing function;
visually meaningful ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3183764
Abstract: Differential Fault Analysis (DFA) and Power Analysis (PA) attacks, have become the main methods for exploiting the vulnerabilities of physical implementations of block ciphers, currently used in a multitude of applications, such as the Advanced…
read more here.
Keywords:
cipher;
block cipher;
power;
dfa ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2021.3126317
Abstract: In the last few years, a large amount of private and sensitive data generated by Internet of Things (IoT) devices need to be transmitted, stored, and processed in security, which become a serve challenge because…
read more here.
Keywords:
cipher;
generalized feistel;
feistel networks;
lightweight block ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Transactions on Computers"
DOI: 10.1109/tc.2018.2890259
Abstract: In this work a new self-synchronized encryption method for 10 Gigabit optical links is proposed and developed. Necessary modifications to introduce this kind of encryption in physical layers based on 64b/66b encoding, such as 10…
read more here.
Keywords:
cipher;
self synchronized;
synchronized encryption;
optical links ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2018.2868245
Abstract: Characterizing the fault space of a cipher to filter out a set of faults potentially exploitable for fault attacks (FA), is a problem with immense practical value. A quantitative knowledge of the exploitable fault space…
read more here.
Keywords:
fault space;
characterization;
cipher;
exploitable fault ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Information Theory"
DOI: 10.1109/tit.2022.3230910
Abstract: Conditional Time-Memory-Data Trade-off (TMDTO) attack given by Biryukov and Shamir can be reduced to the following problem: “Find the minimum number of state bits that should be fixed in order to recover the maximum number…
read more here.
Keywords:
cipher;
tmdto;
state bits;
stream ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "Journal of Algebra and Its Applications"
DOI: 10.1142/s0219498821500845
Abstract: The algebraic structure of the group generated by the encryption functions of a block cipher depends on the key schedule algorithm used for generating the round keys. For such a reason, in general, studying this…
read more here.
Keywords:
cipher;
group;
key schedule;
primitivity group ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2022 at "Computational Intelligence and Neuroscience"
DOI: 10.1155/2022/8338508
Abstract: The protection of confidential information is a global issue, and block encryption algorithms are the most reliable option for securing data. The famous information theorist, Claude Shannon, has given two desirable characteristics that should exist…
read more here.
Keywords:
acoustics;
cipher;
substitution;
box ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "Bulletin of Electrical Engineering and Informatics"
DOI: 10.11591/eei.v9i6.2475
Abstract: The advanced technology in the internet and social media, communication companies, health care records and cloud computing applications made the data around us increase dramatically every minute and continuously. These renewals big data involve sensitive…
read more here.
Keywords:
multi dimensional;
cipher;
block;
dimensional cubic ... See more keywords