Zobrazeno 1 - 10
of 657
pro vyhledávání: '"Symmetric Cryptography"'
Autor:
Nasratullah Ghafoori, Atsuko Miyaji
Publikováno v:
IEEE Access, Vol 12, Pp 13386-13399 (2024)
This paper studies the advanced methodologies of differential cryptanalysis with a particular emphasis on higher-order differentials and higher-order differential-linear cryptanalysis, along with their application to the ChaCha stream cipher. The stu
Externí odkaz:
https://doaj.org/article/3c52141636e84815bc9c7792e961c959
Autor:
Huiqin Xie, Li Yang
Publikováno v:
Symmetry, Vol 16, Iss 9, p 1124 (2024)
In order to design quantum-safe block ciphers, it is crucial to investigate the application of quantum algorithms to cryptographic analysis tools. In this study, we use the Bernstein–Vazirani algorithm to enhance truncated differential cryptanalysi
Externí odkaz:
https://doaj.org/article/bbd1325856634e96bb262bf7580230ae
Publikováno v:
Mathematics, Vol 12, Iss 16, p 2598 (2024)
Due to the superiority of quantum computing, traditional cryptography is facing a severe threat. This makes the security evaluation of cryptographic systems in quantum attack models both significant and urgent. For symmetric ciphers, the security ana
Externí odkaz:
https://doaj.org/article/02715c848541454cabd20c4fad86370e
Publikováno v:
Symmetry, Vol 16, Iss 4, p 440 (2024)
Symmetric cryptography provides the best examples of cryptosystems to be applied in lightweight environments (e.g., IoT). A representative example is the cryptosystem TinyJambu, one of the ten finalists in the NIST Lightweight Cryptography Standardiz
Externí odkaz:
https://doaj.org/article/c5fbe08144fb4d69861db293291b4dfd
Autor:
Duda Jarosław, Niemiec Marcin
Publikováno v:
International Journal of Applied Mathematics and Computer Science, Vol 33, Iss 1, Pp 45-55 (2023)
Data compression combined with effective encryption is a common requirement of data storage and transmission. Low cost of these operations is often a high priority in order to increase transmission speed and reduce power usage. This requirement is cr
Externí odkaz:
https://doaj.org/article/419ecb22f1844feeb7e5a4526b166921
Autor:
Georgii Firsov, Alisa Koreneva
Publikováno v:
Современные информационные технологии и IT-образование, Vol 18, Iss 3, Pp 691-701 (2022)
This research purpose is to develop a reduction-based method for analysis of cryptographic properties of block cipher modes of operation in context of full disk encryption (FDE) via provable security technique, to study weaknesses of widely spread am
Externí odkaz:
https://doaj.org/article/8779daff9b074be683523666799cdf10
Autor:
Hakan Uzuner, Elif Bilge Kavun
Publikováno v:
Cryptography, Vol 8, Iss 1, p 9 (2024)
Cryptographic primitives nowadays are not only implemented in high-performance systems but also in small-scale systems, which are increasingly powered by open-source processors, such as RISC-V. In this work, we leverage RISC-V’s modular base instru
Externí odkaz:
https://doaj.org/article/eec0c434de3f4894a9daaddd6533c7a6
Autor:
Chattamvelli, Rajan
Publikováno v:
International Journal of Information Security and Cybercrime (IJISC). 11(1):49-58
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=1096783
Publikováno v:
IET Signal Processing, Vol 16, Iss 3, Pp 267-280 (2022)
Abstract A wrist‐based photoplethysmography (PPG) tool offers a simple and non‐invasive approach for applications in vital sign monitoring and healthcare. However, in a telecare network, these physiological signals ensure the authorisation demand
Externí odkaz:
https://doaj.org/article/d2ffe0bfede44adfb097e55843c3c2e1
Publikováno v:
International Journal of Applied Mathematics and Computer Science, Vol 32, Iss 1, Pp 139-146 (2022)
The COVID-19 pandemic changed the lives of millions of citizens worldwide in the manner they live and work to the so-called new norm in social standards. In addition to the extraordinary effects on society, the pandemic created a range of unique circ
Externí odkaz:
https://doaj.org/article/87febadb5d254f04ab72b8995280403b