-
41
Quantum Key Based Burst Confidentiality in Optical Burst Switched Networks
Published 2014-01-01“…This paper deals with employing RC4 (stream cipher) to encrypt and decrypt bursts thereby ensuring the confidentiality of the burst. …”
Get full text
Article -
42
An Effective Privacy-Preserving Algorithm Based on Logistic Map and Rubik’s Cube Transformation
Published 2014-01-01“…In every round, chaotic logistic maps generate pseudorandom sequences to cover the plaintext by executing Exclusive-OR operation to form the cipher. Then logistic map is used to create rotation policies to scramble data information based on Rubik’s cube transformation. …”
Get full text
Article -
43
Optimized SM4 Hardware Implementations for Low Area Consumption
Published 2024-01-01“…The SM4 block cipher is standardized in ISO/IEC, and it is also the national standard of commercial cryptography in China. …”
Get full text
Article -
44
Cryptanalysis of an Image Encryption Algorithm Using DNA Coding and Chaos
Published 2025-01-01“…The experimental results show that the chosen plaintext attack can recover the cipher image to the plain image. The cryptanalysis scheme proposed in this paper can provide new ideas for subsequent cryptanalysis work and also provide some meaningful references for designers to improve the security of encryption algorithms when designing them. …”
Get full text
Article -
45
Fine-Grained Support of Security Services for Resource Constrained Internet of Things
Published 2016-05-01“…Several standard organizations related to IoT technologies recommend using the CoAP over DTLS protocol stacks for enabling secure communications between resource constrained things. In general DTLS, a cipher suite required to support specific security service should be negotiated between the CoAP client and server in the process of performing the DTLS handshake protocol. …”
Get full text
Article -
46
Image vaccine against steganography in encrypted domain
Published 2025-02-01“…After encrypting the entire data of a original image using a stream cipher, the vaccine data can be injected into the image without knowing the image content. …”
Get full text
Article -
47
Design of a GSM Based Energy Meter Monitoring and Tamper Detection System.
Published 2023“…In order to adopt new technological advancements to cipher some of the recurring irregularities on the energy grid, in this project, a low voltage energy meter monitoring system with tamper proof measures using GSM technology is proposed. …”
Get full text
Thesis -
48
Chaotic Image Encryption Based on Running-Key Related to Plaintext
Published 2014-01-01“…In the running-key generation stage, by successively disturbing chaotic stream with cipher-text, the relation of running-key to plaintext is established, reconstruction attack is avoided, effective use of chaotic resource is guaranteed, and dynamical degradation of digital chaos is minimized. …”
Get full text
Article -
49
Image Encryption Using Lorenz Chaotic System
Published 2023-03-01“…This paper proposed a method for image encrypted and decrypted electronically using the Lorenz chaotic system, the supposed algorithm was developed by using the three equations of the Lorenz system, before that, the image pixels are destroyed using reversible shifting and rotating processes to increase the randomness of the encrypted pixels and thus the difficulty of cracking the cipher. Then he supposed technique gave the following results: The average entropy calculation was (7.285) before image encryption and (7.9974) after image encryption with an average NPCR of (99.65%) and UACI was (30.35%) this confirms that the proposed method is reliable and applicable. …”
Get full text
Article -
50
Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application
Published 2023-01-01“…The modification lies in the design of the Cipher, we have used power associative (PA) loop and group of permutations. …”
Get full text
Article -
51
Forest Fire Prevention, Detection, and Fighting Based on Fuzzy Logic and Wireless Sensor Networks
Published 2018-01-01“…For this purpose, integrity, confidentiality, and authenticity of environmental information and alerts are protected with implementations of Lamport’s authentication scheme, Diffie-Lamport signature, and AES-CBC block cipher.…”
Get full text
Article -
52
Intelligent Digital Currency and Dynamic Coding Service System Based on Internet of Things Technology
Published 2020-01-01“…Otherwise, it will cache the message and attach its own neighbor node list to the signal-to-noise ratio of the channel link, update the RREQ message, and broadcast it. The payment cipher is managed by the bank. When the user opens an account, the bank registers and sends it to the user. …”
Get full text
Article -
53
Dervish Mehmed bin Mubarek Geray Genghisi. The Chronicle “Tarikh-i Mehmed Geray” (“Mehmed Geray’s History”) (part 4)*
Published 2023-12-01“…A copy of the chronicle has been preserved in the funds of the Austrian National Library (Österreichische Nationalbibliothek) under the cipher (inventory number) No. 1080, Cod. H.O.86 HAN MAG. …”
Get full text
Article -
54
Revisit two memoryless state‐recovery cryptanalysis methods on A5/1
Published 2023-07-01“…Abstract At ASIACRYPT 2019, Zhang proposed a near collision attack on A5/1 claiming to recover the 64‐bit A5/1 state with a time complexity around 232 cipher ticks with negligible memory requirements. …”
Get full text
Article -
55
A Secure and Efficient White-Box Implementation of SM4
Published 2024-12-01“…In our approach, the Feistel cipher SM4 is implemented by a series of table-lookup operations, and the input and output of each table are protected by affine transformations and nonlinear encodings generated randomly. …”
Get full text
Article -
56
The SPN Network for Digital Audio Data Based on Elliptic Curve Over a Finite Field
Published 2022-01-01“…The generated S-box is then used parallel in the substitution module, which provides optimum confusion in the cipher data. For the diffusion property, the scheme generates pseudo-random number sequences used for block permutation and achieves the property of diffusion. …”
Get full text
Article -
57
Comprehensive guide for epigenetics and transcriptomics data quality control
Published 2025-03-01Get full text
Article -
58
Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications
Published 2021-01-01“…The key size used for each encryption algorithm is the maximum bytes the cipher can allow. To the comparison, the average time required to compute the algorithm by the three devices is used. …”
Get full text
Article -
59
Automatic Search of Differential Characteristics and Improved Differential Cryptanalysis for PRINCE, QARMA, and MANTIS
Published 2024-01-01“…PRINCE, MANTIS, QARMA, and PRINCEv2 are lightweight block ciphers with reflection feature proposed in recent years. …”
Get full text
Article -
60
A New (Related-Key) Neural Distinguisher Using Two Differences for Differential Cryptanalysis
Published 2024-01-01“…To demonstrate the effectiveness of our approach, we apply it to the block ciphers: Simon, Speck, Simeck, and Hight. Compared to the existing results, our method can provide improved accuracy and even increase the number of rounds that can be analyzed. …”
Get full text
Article