6   Artículos

 
en línea
Jintao Rao and Zhe Cui    
The SM4 algorithm is widely used to ensure the security of data transmission. The traditional chosen plaintext power attacks against SM4 usually need to analyze four rounds power traces in turn to recover the secret key. In this paper, we propose a new c... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yuqiang Dou and Ming Li    
Security of image communication is more and more important in many applications such as the transmission of military and medical images. To meet the requirement, a new color image encryption algorithm using a new one-dimension (1D) chaotic map was propos... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yuichi Komano and Shoichi Hirose    
The re-keying scheme is a variant of the symmetric encryption scheme where a sender (respectively, receiver) encrypts (respectively, decrypts) plaintext with a temporal session key derived from a master secret key and publicly-shared randomness. It is on... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »