Showing 41 - 60 results of 66 for search '"cipher"', query time: 0.05s Refine Results
  1. 41

    Quantum Key Based Burst Confidentiality in Optical Burst Switched Networks by A. M. Balamurugan, A. Sivasubramanian

    Published 2014-01-01
    “…This paper deals with employing RC4 (stream cipher) to encrypt and decrypt bursts thereby ensuring the confidentiality of the burst. …”
    Get full text
    Article
  2. 42

    An Effective Privacy-Preserving Algorithm Based on Logistic Map and Rubik’s Cube Transformation by Wenbin Yao, Pengdi Ye, Xiaoyong Li

    Published 2014-01-01
    “…In every round, chaotic logistic maps generate pseudorandom sequences to cover the plaintext by executing Exclusive-OR operation to form the cipher. Then logistic map is used to create rotation policies to scramble data information based on Rubik’s cube transformation. …”
    Get full text
    Article
  3. 43

    Optimized SM4 Hardware Implementations for Low Area Consumption by Ruolin Zhang, Zejun Xiang, Shasha Zhang, Xiangyong Zeng, Min Song

    Published 2024-01-01
    “…The SM4 block cipher is standardized in ISO/IEC, and it is also the national standard of commercial cryptography in China. …”
    Get full text
    Article
  4. 44

    Cryptanalysis of an Image Encryption Algorithm Using DNA Coding and Chaos by Yuzhuo Zhao, Qiqin Shi, Qun Ding

    Published 2025-01-01
    “…The experimental results show that the chosen plaintext attack can recover the cipher image to the plain image. The cryptanalysis scheme proposed in this paper can provide new ideas for subsequent cryptanalysis work and also provide some meaningful references for designers to improve the security of encryption algorithms when designing them. …”
    Get full text
    Article
  5. 45

    Fine-Grained Support of Security Services for Resource Constrained Internet of Things by Hyo Jin Ban, Jaeduck Choi, Namhi Kang

    Published 2016-05-01
    “…Several standard organizations related to IoT technologies recommend using the CoAP over DTLS protocol stacks for enabling secure communications between resource constrained things. In general DTLS, a cipher suite required to support specific security service should be negotiated between the CoAP client and server in the process of performing the DTLS handshake protocol. …”
    Get full text
    Article
  6. 46

    Image vaccine against steganography in encrypted domain by Xinran Li, Zichi Wang

    Published 2025-02-01
    “…After encrypting the entire data of a original image using a stream cipher, the vaccine data can be injected into the image without knowing the image content. …”
    Get full text
    Article
  7. 47

    Design of a GSM Based Energy Meter Monitoring and Tamper Detection System. by Bakenge Joshua

    Published 2023
    “…In order to adopt new technological advancements to cipher some of the recurring irregularities on the energy grid, in this project, a low voltage energy meter monitoring system with tamper proof measures using GSM technology is proposed. …”
    Get full text
    Thesis
  8. 48

    Chaotic Image Encryption Based on Running-Key Related to Plaintext by Cao Guanghui, Hu Kai, Zhang Yizhi, Zhou Jun, Zhang Xing

    Published 2014-01-01
    “…In the running-key generation stage, by successively disturbing chaotic stream with cipher-text, the relation of running-key to plaintext is established, reconstruction attack is avoided, effective use of chaotic resource is guaranteed, and dynamical degradation of digital chaos is minimized. …”
    Get full text
    Article
  9. 49

    Image Encryption Using Lorenz Chaotic System by Daniah Abul Qahar Shakir, Ahmad Salim, Seddiq Q. Abd Al-Rahman, Ali Makki Sagheer

    Published 2023-03-01
    “…This paper proposed a method for image encrypted and decrypted electronically using the Lorenz chaotic system, the supposed algorithm was developed by using the three equations of the Lorenz system, before that, the image pixels are destroyed using reversible shifting and rotating processes to increase the randomness of the encrypted pixels and thus the difficulty of cracking the cipher. Then he supposed technique gave the following results: The average entropy calculation was (7.285) before image encryption and (7.9974) after image encryption with an average NPCR of (99.65%) and UACI was (30.35%) this confirms that the proposed method is reliable and applicable. …”
    Get full text
    Article
  10. 50

    Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application by Sadam Hussain, Muhammad Asif, Tariq Shah, Abid Mahboob, Sayed M. Eldin

    Published 2023-01-01
    “…The modification lies in the design of the Cipher, we have used power associative (PA) loop and group of permutations. …”
    Get full text
    Article
  11. 51

    Forest Fire Prevention, Detection, and Fighting Based on Fuzzy Logic and Wireless Sensor Networks by Josué Toledo-Castro, Pino Caballero-Gil, Nayra Rodríguez-Pérez, Iván Santos-González, Candelaria Hernández-Goya, Ricardo Aguasca-Colomo

    Published 2018-01-01
    “…For this purpose, integrity, confidentiality, and authenticity of environmental information and alerts are protected with implementations of Lamport’s authentication scheme, Diffie-Lamport signature, and AES-CBC block cipher.…”
    Get full text
    Article
  12. 52

    Intelligent Digital Currency and Dynamic Coding Service System Based on Internet of Things Technology by Shanshen Li, Xin Jing

    Published 2020-01-01
    “…Otherwise, it will cache the message and attach its own neighbor node list to the signal-to-noise ratio of the channel link, update the RREQ message, and broadcast it. The payment cipher is managed by the bank. When the user opens an account, the bank registers and sends it to the user. …”
    Get full text
    Article
  13. 53

    Dervish Mehmed bin Mubarek Geray Genghisi. The Chronicle “Tarikh-i Mehmed Geray” (“Mehmed Geray’s History”) (part 4)* by Refat Abduzhemilev

    Published 2023-12-01
    “…A copy of the chronicle has been preserved in the funds of the Austrian National Library (Österreichische Nationalbibliothek) under the cipher (inventory number) No. 1080, Cod. H.O.86 HAN MAG. …”
    Get full text
    Article
  14. 54

    Revisit two memoryless state‐recovery cryptanalysis methods on A5/1 by Yanbin Xu, Yonglin Hao, Mingxing Wang

    Published 2023-07-01
    “…Abstract At ASIACRYPT 2019, Zhang proposed a near collision attack on A5/1 claiming to recover the 64‐bit A5/1 state with a time complexity around 232 cipher ticks with negligible memory requirements. …”
    Get full text
    Article
  15. 55

    A Secure and Efficient White-Box Implementation of SM4 by Xiaobo Hu, Yanyan Yu, Yinzi Tu, Jing Wang, Shi Chen, Yuqi Bao, Tengyuan Zhang, Yaowen Xing, Shihui Zheng

    Published 2024-12-01
    “…In our approach, the Feistel cipher SM4 is implemented by a series of table-lookup operations, and the input and output of each table are protected by affine transformations and nonlinear encodings generated randomly. …”
    Get full text
    Article
  16. 56

    The SPN Network for Digital Audio Data Based on Elliptic Curve Over a Finite Field by Ijaz Khalid, Tariq Shah, Khalid Ali Almarhabi, Dawood Shah, Muhammad Asif, M. Usman Ashraf

    Published 2022-01-01
    “…The generated S-box is then used parallel in the substitution module, which provides optimum confusion in the cipher data. For the diffusion property, the scheme generates pseudo-random number sequences used for block permutation and achieves the property of diffusion. …”
    Get full text
    Article
  17. 57
  18. 58

    Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications by Mohammad Kamrul Hasan, Muhammad Shafiq, Shayla Islam, Bishwajeet Pandey, Yousef A. Baker El-Ebiary, Nazmus Shaker Nafi, R. Ciro Rodriguez, Doris Esenarro Vargas

    Published 2021-01-01
    “…The key size used for each encryption algorithm is the maximum bytes the cipher can allow. To the comparison, the average time required to compute the algorithm by the three devices is used. …”
    Get full text
    Article
  19. 59

    Automatic Search of Differential Characteristics and Improved Differential Cryptanalysis for PRINCE, QARMA, and MANTIS by Yaxin Cui, Hong Xu, Lin Tan, Wenfeng Qi

    Published 2024-01-01
    “…PRINCE, MANTIS, QARMA, and PRINCEv2 are lightweight block ciphers with reflection feature proposed in recent years. …”
    Get full text
    Article
  20. 60

    A New (Related-Key) Neural Distinguisher Using Two Differences for Differential Cryptanalysis by Gao Wang, Gaoli Wang, Siwei Sun

    Published 2024-01-01
    “…To demonstrate the effectiveness of our approach, we apply it to the block ciphers: Simon, Speck, Simeck, and Hight. Compared to the existing results, our method can provide improved accuracy and even increase the number of rounds that can be analyzed. …”
    Get full text
    Article