62 downloads
166 views

This paper presents an assessment of blockchain technology based on the Emerging Technology Analysis Canvas (ETAC) to evaluate the drivers and potential outcomes. The ETAC is a framework to critically analyze emerging technologies. The assessment finds that blockchain...

["Cryptography","Distributed and Parallel Computing","Emerging Technologies","Security and Privacy"]
doi:10.7287/peerj.preprints.27529v1
91 downloads
166 views

We develop an efficient software package to test for the primality of p2^n+1, p prime and p>2^n. This aids in the determination of large, non-Sierpinski numbers p, for prime p, and in cryptography. It furthermore uniquely allows for the computation of the smallest...

["Cryptography","Data Science","Theory and Formal Methods"]
doi:10.7287/peerj.preprints.27396v1
52 downloads
136 views

Steganography and Steganalysis in recent years have become an important area of research involving dierent applications. Steganography is the process of hiding secret data into any digital media without any signicant notable changes in a cover object, while steganalysis...

["Cryptography"]
doi:10.7287/peerj.preprints.27339v1
1,383 downloads
424 views

This survey focuses on authentication methods for the Internet of Things (IoT). There are many different authentication methods that are used in the IT industry but not all of these can be adapted for the IoT. Lightweight and mutual authentication methods will...

["Computer Networks and Communications","Cryptography","Embedded Computing","Security and Privacy"]
doi:10.7287/peerj.preprints.26474v2
2,146 downloads
1,030 views

A problem facing healthcare record systems throughout the world is how to share the medical data with more stakeholders for various purposes without sacrificing data privacy and integrity. Blockchain, operating in a state of consensus, is the underpinning technology...

["Computer Networks and Communications","Cryptography","Data Science","Security and Privacy"]
doi:10.7287/peerj.preprints.26942v1
314 downloads
398 views

Bitcoin is a crypto currency system that has been rapidly adopted due to its anonymity and decentralized properties. Blockchain is the underpinning technology that maintains the Bitcoin transaction ledger. The blockchain network operates in a state of consensus,...

["Adaptive and Self-Organizing Systems","Autonomous Systems","Cryptography","Data Mining and Machine Learning","Network Science and Online Social Networks"]
doi:10.7287/peerj.preprints.26911v1
363 downloads
454 views

In modern as well as ancient ciphers of public key cryptography, substitution boxes find a permanent seat. Generation and cryptanalysis of 4-bit as well as 8-bit crypto S-boxes is of utmost importance in modern cryptography. In this paper, a detailed review of...

["Computer Networks and Communications","Cryptography"]
doi:10.7287/peerj.preprints.26452v1
211 downloads
237 views

This paper deals with the merger of the two lightweight stream ciphers – A5/1 and Trivium. The idea is to make the key stream generation more secure and to remove the attacks of the individual algorithms. The bits generated by the Trivium cipher (output) will act...

["Cryptography"]
doi:10.7287/peerj.preprints.6571v1
272 downloads
214 views

4-bit Linear Relations play an important role in Cryptanalysis of 4-bit Bijective Crypto S-boxes. 4-bit finite differences also a major part of cryptanalysis of 4-bit substitution boxes. Count of existence of all 4-bit linear relations, for all of 16 input and...

["Computer Networks and Communications","Cryptography"]
doi:10.7287/peerj.preprints.3441v1
89 downloads
183 views

Substitution Box or S-Box had been generated using 4-bit Boolean Functions (BFs) for Encryption and Decryption Algorithm of Lucifer and Data Encryption Standard (DES) in late sixties and late seventies respectively. The S-Box of Advance Encryption Standard have...

["Algorithms and Analysis of Algorithms","Cryptography"]
doi:10.7287/peerj.preprints.3300v1
118 downloads
251 views

US defence sponsored the DES program in 1974 and released it in 1977. It remained as a well-known and well accepted block cipher until 1998. Thirty-two 4-bit DES S-Boxes are grouped in eight each with four and are put in public domain without any mention of their...

["Algorithms and Analysis of Algorithms","Cryptography"]
doi:10.7287/peerj.preprints.3285v1
38 downloads
129 views

Irreducible Polynomials (IPs) have been of utmost importance in generation of substitution boxes in modern cryptographic ciphers. In this paper an algorithm entitled Composite Algorithm using both multiplication and division over Galois fields have been demonstrated...

["Cryptography","Scientific Computing and Simulation","Security and Privacy"]
doi:10.7287/peerj.preprints.3259v1
86 downloads
148 views

Searching for Monic Irreducible Polynomials (IPs) over extended Galois Field GF(p^q) for large value of prime moduli p and extension to Galois Field q is a well needed solution in the field of Cryptography. In this paper a new algorithm to obtain Monic IPs over...

["Cryptography","Security and Privacy"]
doi:10.7287/peerj.preprints.3258v1
142 downloads
155 views

4-bit Linear Relations play an important role in Cryptanalysis of 4-bit Bijective S-Boxes. Count of existence of all 4-bit Linear Relations, for all of 16 input and output 4-bit bit patterns of 4-bit Bijective S-Boxes said as S-Boxes has been reported in Linear...

["Cryptography"]
doi:10.7287/peerj.preprints.3249v1
47 downloads
136 views

Bitwise-Xor of two 4 bit binary numbers or 4-bit bit patterns entitled 4-bit differences carries information in Cryptography. The Method to Analyze Cryptographic cipher algorithms or 4-bit substitution boxes with 4-bit differences is known as Differential Cryptanalysis....

["Cryptography"]
doi:10.7287/peerj.preprints.3202v1

Top subject areas - Articles & Preprints

Top subject areas - People

View all subject areas