Results 21 to 30 of about 9,006 (193)

The Deoxys AEAD Family

open access: yesJournal of Cryptology, 2021
We present the Deoxys family of authenticated encryption schemes, which consists of Deoxys-I and Deoxys-II. Both are nonce-based authenticated encryption schemes with associated data and have either 128- or 256-bit keys. Deoxys-I is similar to OCB: It is single-pass but insecure when nonces are repeated; in contrast, Deoxys-II is nonce-misuse resistant.
Jean, Jérémy   +3 more
openaire   +3 more sources

Residual vulnerabilities to power side channel attacks of lightweight ciphers cryptography competition finalists

open access: yesIET Computers &Digital Techniques, Volume 17, Issue 3-4, Page 75-88, May-July 2023., 2023
A comprehensive evaluation of the seven (out of 10) algorithm finalists of the NIST IoT lightweight cipher competition that do not integrate built‐in countermeasures is proposed. The study shows that, nonetheless, they still present some residual vulnerabilities to power SCA.
Aurelien T. Mozipo, John M. Acken
wiley   +1 more source

MILP‐based security evaluation for AEGIS/Tiaoxin‐346/Rocca

open access: yesIET Information Security, Volume 17, Issue 3, Page 458-467, May 2023., 2023
In this paper, the security of Advanced Encryption Standard‐based authenticated encryption schemes, including AEGIS family, Tiaoxin‐346, and Rocca, is examined by mixed integer linear programing (MILP) tools. Specifically, for the initialisation phase of AEGIS, Tiaoxin‐346, and Rocca, the security against differential attacks and integral attacks is ...
Takuro Shiraya   +3 more
wiley   +1 more source

A preimage attack on reduced GIMLI‐HASH with unbalanced squeezing phase

open access: yesIET Information Security, Volume 17, Issue 1, Page 66-79, January 2023., 2023
Abstract In Conference on Cryptographic Hardware and Embedded System 2017, Bernstein et al. proposed GIMLI, a 384‐bit permutation with 24 rounds, which aims to provide high performance on various platforms. In 2019, the full‐round (24 rounds) GIMLI permutation was used as an underlying primitive for building AEAD GIMLI‐CIPHER and hash function GIMLI ...
Yongseong Lee   +3 more
wiley   +1 more source

Securing Topology Control in SDWSNs Using Identity‐Based Cryptography

open access: yesJournal of Sensors, Volume 2023, Issue 1, 2023., 2023
In software‐defined wireless sensor networks (SDWSNs), topology control is a fundamental procedure to maintain the global network topology. However, the open wireless channels of SDWSNs make it possible for an attacker to eavesdrop, replay, or modify the topology messages, thus posing a great threat to the network operations.
Rui Wang   +11 more
wiley   +1 more source

Power Yoga: Variable-Stretch Security of CCM for Energy-Efficient Lightweight IoT

open access: yesIACR Transactions on Symmetric Cryptology, 2021
The currently ongoing NIST LWC project aims at identifying new standardization targets for lightweight authenticated encryption with associated data (AEAD) and (optionally) lightweight cryptographic hashing.
Emiljano Gjiriti   +2 more
doaj   +1 more source

ROLE OF MICROWAVE ENERGY TO CONTROL THREE SPECIES OF STORE PRODUCTS INSECTS [PDF]

open access: yesMesopotamia Journal of Agriculture, 2008
Three levels of microwave energy low ,medium& ,high. 260,520 and 780 w, respectively were used to control three species of the saw-toothed grain beetle Oryzaephilus surinamensis L.,Red flour beetle Tribolium castaneum Herbst,the Khapra beetle Trogoderma ...
Aead Y. Ismail
doaj   +1 more source

Subverting Decryption in AEAD [PDF]

open access: yes, 2019
This work introduces a new class of Algorithm Substitution Attack (ASA) on Symmetric Encryption Schemes. ASAs were introduced by Bellare, Paterson and Rogaway in light of revelations concerning mass surveillance. An ASA replaces an encryption scheme with a subverted version that aims to reveal information to an adversary engaged in mass surveillance ...
Marcel Armour, Bertram Poettering
openaire   +1 more source

Efficient (Masked) Hardware Implementation of Grain‐128AEADv2

open access: yesSecurity and Communication Networks, Volume 2023, Issue 1, 2023., 2023
We consider the efficient hardware implementation of Grain‐128AEADv2, which is the second version of Grain‐128AEAD (one of the lightweight cryptography finalist candidates). In order to counteract side‐channel attacks, the efficient masked hardware implementation of Grain‐128AEADv2 is also considered under the idea of domain‐oriented masking. In detail,
Bohan Li   +3 more
wiley   +1 more source

Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G

open access: yesIACR Transactions on Symmetric Cryptology, 2021
In this paper, we present an AES-based authenticated-encryption with associated-data scheme called Rocca, with the purpose to reach the requirements on the speed and security in 6G systems. To achieve ultra-fast software implementations, the basic design
Kosei Sakamoto   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy