The modeling of side channel leaks of power consumption during executing cryptographic algorithms is one of the perspective research areas in the field of security of cyber-physical systems. The use of algorithmically...
详细信息
The rise of quantum computing poses a grave threat to current cryptographic methods. While Quantum Key Distribution (QKD) offers a potential solution, guaranteeing its security in real-world implementations remains ch...
详细信息
This study presents a comprehensive performance analysis of symmetric encryption algorithms in the context of time-critical cybersecurity applications. We evaluate a diverse set of algorithms, including established st...
详细信息
This work examines the potential of quantum resistant variants of NIST IR 8454 lightweight encryption algorithms in the field of image encryption. Selected algorithms from ASCON, TinyJAMBU and SPARKLE families were an...
详细信息
In today's digital era, cryptographic algorithms play a vital role in safeguarding sensitive information, maintaining confidentiality, and defending against cyberattacks. With the growing variety of encryption met...
详细信息
This paper briefly introduces wireless sensor networks (WSNs) and proposes an enhancement to a block encryption algorithm using chaotic mapping principles. The proposed encryption algorithm was tested on an establishe...
详细信息
We will construct post-quantum encryption algorithms based on three-variable polynomial Beal-Schur congruence. After giving a proof of Beal's conjecture and citing some applications of it to selected cases where t...
详细信息
Chaotic map, due to its excellent unpredictability and complexity, is widely used in various fields, such as information security, information communication, and system control, etc., thus research work is being inten...
详细信息
This article proposes a novel multiple-image encryption algorithm (MIEA) that utilizes parallel processing. The proposed MIEA combines multiple plain images, forming a plain image cube. The proposed MIEA is based on t...
详细信息
Vehicle-to-vehicle communication is one of the new paradigms of networking, which should be secure, fast, and efficient. In this paper, we propose a framework that implements the pseudonym-based authentication scheme ...
详细信息
暂无评论