ﻻ يوجد ملخص باللغة العربية
Nowadays computational complexity of fast walsh hadamard transform and nonlinearity for Boolean functions and large substitution boxes is a major challenge of modern cryptography research on strengthening encryption schemes against linear and differential attacks. Time and memory complexities of the best existing algorithm for computing fast walsh hadamard transform and non linearity for n x m substitution boxes (n >= 16;m >= 16) is O(2^(n+m)). This paper proposes three new acceleration methods that improve the computation time for parallelized walsh matrix up to 39 folds and the computation time for non linearity degree up to 563 folds, defining and accessing walsh matrix transpose, and incorporating an important part of computation process of non linearity in the computation algorithm of walsh matrix. The validity of the proposed algorithms is verified by means of simulation and experimentation and the overall analysis of resource consumption of proposed algorithms was compared with previous ones.
The correct use of cryptography is central to ensuring data security in modern software systems. Hence, several academic and commercial static analysis tools have been developed for detecting and mitigating crypto-API misuse. While developers are opt
Any secured system can be modeled as a capability-based access control system in which each user is given a set of secret keys of the resources he is granted access to. In some large systems with resource-constrained devices, such as sensor networks
A symmetric encryption method based on properties of quasicrystals is proposed. The advantages of the cipher are strict aperiodicity and everywhere discontinuous property as well as the speed of computation, simplicity of implementation and a straigh
Compressive sensing (CS) has been widely studied and applied in many fields. Recently, the way to perform secure compressive sensing (SCS) has become a topic of growing interest. The existing works on SCS usually take the sensing matrix as a key and
This paper explores the use of relational symbolic execution to counter timing side channels in WebAssembly programs. We design and implement Vivienne, an open-source tool to automatically analyze WebAssembly cryptographic libraries for constant-time