Sign Up to like & get
recommendations!
0
Published in 2018 at "Mobile Networks and Applications"
DOI: 10.1007/s11036-018-1005-3
Abstract: With the advance of the communication technology and the massive flow of information across the internet, it is becoming urgent to keep the confidentiality of the transmitted information. Using the internet has been extended to…
read more here.
Keywords:
merkle hellman;
optimization;
cryptanalysis;
optimization algorithm ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "Chinese Journal of Electronics"
DOI: 10.1049/cje.2020.05.010
Abstract: Differential-linear cryptanalysis has attracted much attention since proposed to attack DES in 1994, and then some generalized theories are developed to complement and unify the method. However, the links between differential-linear cryptanalysis and other important…
read more here.
Keywords:
linear cryptanalysis;
linear hull;
understanding differential;
cryptanalysis ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2019.2962101
Abstract: Meet in the middle (MITM) attack is one of the most important and applicable methods for cryptanalysis of block ciphers. In this paper, a more generalized method for MITM attack is considered. For this purpose,…
read more here.
Keywords:
block ciphers;
cryptanalysis;
search algorithm;
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3054380
Abstract: In this paper, a multilayer dynamic encryption scheme using deoxyribonucleic acid reconstructed chaotic sequences (DNA-RCS) under cryptanalysis is firstly proposed, which aims at enhancing the security of orthogonal frequency division multiplexing passive optical network (OFDM-PON).…
read more here.
Keywords:
multilayer dynamic;
chaotic sequences;
security;
permutation ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3214665
Abstract: PIPO is a lightweight block cipher proposed at ICISC 2020, which has a byte-oriented structure suitable for bit-sliced implementation and allows for efficient higher-order masking implementations. In this study, we use bit-based division property techniques…
read more here.
Keywords:
cryptanalysis;
lightweight block;
block cipher;
pipo ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "IEEE Photonics Journal"
DOI: 10.1109/jphot.2017.2661809
Abstract: Optical techniques for information security have drawn a lot of attention in recent years. The development of cryptanalysis strategies will also have a positive promotion for the cryptosystems themselves. However, most of the present publications…
read more here.
Keywords:
method using;
optical cryptanalysis;
cryptanalysis method;
cryptanalysis ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2022 at "International Journal of Distributed Sensor Networks"
DOI: 10.1177/15501329221119398
Abstract: Lightweight ciphers are often used as the underlying encryption algorithm in resource-constrained devices. Their cryptographic security is a mandatory goal for ensuring the security of data transmission. Differential cryptanalysis is one of the most fundamental…
read more here.
Keywords:
differential cryptanalysis;
anu;
block;
cryptanalysis ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "China Communications"
DOI: 10.23919/jcc.2020.06.012
Abstract: In recent years, with the rapid development of the Internet of Things (IoT), RFID tags, industrial controllers, sensor nodes, smart cards and other small computing devices are increasingly widely deployed. In order to help protect…
read more here.
Keywords:
hash;
skinny hash;
new collision;
cryptanalysis ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "Entropy"
DOI: 10.3390/e23020202
Abstract: Based on orthogonal Latin cubes, an image cryptosystem with confusion–diffusion–confusion cipher architecture has been proposed recently (Inf. Sci. 2019, 478, 1–14). However, we find that there are four fatal vulnerabilities in this image cryptosystem, which…
read more here.
Keywords:
image;
algorithm;
cryptanalysis;
latin cubes ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "Symmetry"
DOI: 10.3390/sym15010189
Abstract: Reversible data hiding in encrypted images (RDHEI) is commonly used for privacy protection in images stored on cloud storage. Currently, block permutation and co-modulation (BPCM) encryption is commonly utilized in most existing RDHEI schemes to…
read more here.
Keywords:
encrypted images;
image;
method;
cryptanalysis ... See more keywords