-
1
Key committing attack on Tiaoxin-346 algorithm
Published 2025-04-01“…It ensures that an adversary cannot decrypt a given ciphertext to different sets of key, nonce, and associated data. In this study, we explore a key committing attack on the authenticated encryption stream cipher Tiaoxin-346 from the perspective of internal state collisions. …”
Get full text
Article -
2
Analyzing cryptographic algorithm efficiency with in graph-based encryption models
Published 2025-07-01“…The CPU's internal clock was employed to record the execution time of encryption and decryption operations, facilitating the assessment of time complexity for both algorithms. …”
Get full text
Article -
3
DynBlock: dynamic data encryption with Toffoli gate for IoT
Published 2025-05-01Get full text
Article -
4
Fuzzy Encryption Search Scheme and Data Verification Mechanism Based on Blockchain
Published 2025-04-01Get full text
Article -
5
Improving the Integrity of a Voting Process with Biometric Authentication and Data Encryption
Published 2023-04-01Get full text
Article -
6
-
7
Precision-Enhanced and Encryption-Mixed Privacy-Preserving Data Aggregation in Wireless Sensor Networks
Published 2013-04-01Get full text
Article -
8
-
9
-
10
Lightweight image encryption using integer reversible discrete Dual-Hahn transform on embedded systems
Published 2025-09-01Get full text
Article -
11
Development of a confidential search algorithm in distributed systems
Published 2023-09-01“…This paper deals with distributed computing systems, as well as distributed data storage systems. Given the existing internal threats to such systems. …”
Get full text
Article -
12
-
13
Individual health passport storage, sharing and verification scheme based on blockchain
Published 2024-04-01“…This scheme employed a hybrid on-chain and off-chain storage methodology and incorporated searchable encryption with blockchain technology. This integration aimed to streamline blockchain storage, alleviating the storage load while guaranteeing the dependable archiving and secure dissemination of user-sensitive data. …”
Get full text
Article -
14
ANALYSIS OF THE CHARACTERISTICS OF INTERNATIONAL STANDARD ALGORITHMS «LIGHTWEIGHT CRYPTOGRAPHY» – ISO/IEC 29192-3:2012
Published 2016-10-01“…The data on the characteristics of international standard algorithms «lightweight cryptography» while application in hardware implementation based on microchips of FPGA are provided. …”
Get full text
Article -
15
Example of internal function for Sponge scheme built on the basis of the generalized AES design methodology
Published 2021-06-01“…The most common approach is to use a permutation based on a symmetric block encryption algorithm with constants as the key. This article builds an internal function using the generalized AES design methodology. …”
Get full text
Article -
16
Cryptanalysis of hyperchaotic S-box generation and image encryption
Published 2024-12-01Get full text
Article -
17
A novel dilated weighted recurrent neural network (RNN)-based smart contract for secure sharing of big data in Ethereum blockchain using hybrid encryption schemes
Published 2025-06-01“…This algorithm manages keys efficiently and securely, which improves data security during blockchain operations. …”
Get full text
Article -
18
-
19
Unlocking efficiency in real-world collaborative studies: a multi-site international study with one-shot lossless GLMM algorithm
Published 2025-07-01“…Abstract The widespread adoption of real-world data has given rise to numerous healthcare-distributed research networks, but multi-site analyses still face administrative burdens and data privacy challenges. …”
Get full text
Article -
20