36   Artículos

 
en línea
Aaradh Nepal and Francesco Perono Cacciafoco    
During the Bronze Age, the inhabitants of regions of Crete, mainland Greece, and Cyprus inscribed their languages using, among other scripts, a writing system called Linear A. These symbols, mainly characterized by combinations of lines, have, since thei... ver más
Revista: Information    Formato: Electrónico

 
en línea
Zahra Ebadi Ansaroudi, Rocco Zaccagnino and Paolo D?Arco    
Pseudorandomness is a crucial property that the designers of cryptographic primitives aim to achieve. It is also a key requirement in the calls for proposals of new primitives, as in the case of block ciphers. Therefore, the assessment of the property is... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Oluwakemi Christiana Abikoye, Esau Taiwo Oladipupo, Agbotiname Lucky Imoize, Joseph Bamidele Awotunde, Cheng-Chi Lee and Chun-Ta Li    
The application of the Internet of Medical Things (IoMT) in medical systems has brought much ease in discharging healthcare services by medical practitioners. However, the security and privacy preservation of critical user data remain the reason the tech... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Alexandr Kuznetsov, Mikolaj Karpinski, Ruslana Ziubina, Sergey Kandiy, Emanuele Frontoni, Oleksandr Peliukh, Olga Veselska and Ruslan Kozak    
The problem of nonlinear substitution generation (S-boxes) is investigated in many related works in symmetric key cryptography. In particular, the strength of symmetric ciphers to linear cryptanalysis is directly related to the nonlinearity of substituti... ver más
Revista: Information    Formato: Electrónico

 
en línea
Argyrios Sideris, Theodora Sanida and Minas Dasygenis    
Hash functions are an essential mechanism in today?s world of information security. It is common practice to utilize them for storing and verifying passwords, developing pseudo-random sequences, and deriving keys for various applications, including milit... ver más
Revista: Information    Formato: Electrónico

 
en línea
Oleg A. Logachev,Sergei N. Fedorov,Valeriy V. Yashchenko     Pág. 27 - 31
Boolean functions that are maximally nonlinear, that is, having maximal Hamming distance from the set of affine Boolean functions, are widely used, for  example, in the construction of ciphers, since they increase their security  against  ... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Argyrios Sideris and Minas Dasygenis    
Information is transmitted between multiple insecure routing hops in text, image, video, and audio. Thus, this multi-hop digital data transfer makes secure transmission with confidentiality and integrity imperative. This protection of the transmitted dat... ver más
Revista: Computation    Formato: Electrónico

 
en línea
Kunbolat Algazy, Kairat Sakan, Nursulu Kapalova, Saule Nyssanbayeva and Dilmukhanbet Dyusenbayev    
The article observes the new hashing algorithm HBC-256. The HBC-256 algorithm is based on the block cipher of the compression function CF (Compression Function) and produces a 256-bits hash value. Like any new cryptographic structure, the HBC-256 algorit... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Aleksey I. Pakhomchik, Vladimir V. Voloshinov, Valerii M. Vinokur and Gordey B. Lesovik    
There exists a wide range of constraint programming (CP) problems defined on Boolean functions depending on binary variables. One of the approaches to solving CP problems is using specific appropriate solvers, e.g., SAT solvers. An alternative is using t... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Hui Yan and Chaoyuan Cui    
Cache side channel attacks, as a type of cryptanalysis, seriously threaten the security of the cryptosystem. These attacks continuously monitor the memory addresses associated with the victim?s secret information, which cause frequent memory access on th... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »