-
21
Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms
Published 2025-01-01“…We evaluated several cryptographic protocols, including AES-ECB, AES-GCM, ChaCha20, RSA, and ECC, against critical metrics such as security level, efficiency, side-channel resistance, and cryptanalysis resistance. Our findings demonstrate that this integrated approach significantly enhances both security and efficiency across all evaluated protocols. …”
Get full text
Article -
22
Secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks
Published 2016-07-01“…Choi et al. analyzed Yoon and Kim’s scheme and performed a security cryptanalysis in 2016. They demonstrated that Yoon and Kim’s scheme had several security problems, and proposed instead an improved biometric-based user authentication scheme using fuzzy extraction. …”
Get full text
Article -
23
A Novel Scheme for Construction of S-Box Using Action of Power Associative Loop and Its Applications in Text Encryption
Published 2024-01-01“…Substitution boxes (S-boxes) play an important role in symmetric key cryptography because they add complexity and resist cryptanalysis, improving the overall security of encrypted data. …”
Get full text
Article -
24
Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps
Published 2019-04-01“…They also proposed a new scheme after presenting the corresponding cryptanalysis. However, we found that Park et al.’s scheme is vulnerable to offline password guessing attack, which is the most serious threat against this kind of authentication scheme. …”
Get full text
Article -
25
Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives
Published 2024-06-01“…In this case, quantum cryptanalysis is reduced to Grover's scheme with exponential implementation complexity. …”
Get full text
Article -
26
A Novel Construction of Substitution Box Based on Polynomial Mapped and Finite Field With Image Encryption Application
Published 2022-01-01“…S-boxes with low value of differential uniformity and high value of nonlinearity are considered more secure against cryptanalysis attacks. For the construction of <inline-formula> <tex-math notation="LaTeX">$8\times 8$ </tex-math></inline-formula> S-boxes, an efficient and novel scheme is presented in this paper. …”
Get full text
Article