Results 21 to 30 of about 9,006 (193)
We present the Deoxys family of authenticated encryption schemes, which consists of Deoxys-I and Deoxys-II. Both are nonce-based authenticated encryption schemes with associated data and have either 128- or 256-bit keys. Deoxys-I is similar to OCB: It is single-pass but insecure when nonces are repeated; in contrast, Deoxys-II is nonce-misuse resistant.
Jean, Jérémy +3 more
openaire +3 more sources
A comprehensive evaluation of the seven (out of 10) algorithm finalists of the NIST IoT lightweight cipher competition that do not integrate built‐in countermeasures is proposed. The study shows that, nonetheless, they still present some residual vulnerabilities to power SCA.
Aurelien T. Mozipo, John M. Acken
wiley +1 more source
MILP‐based security evaluation for AEGIS/Tiaoxin‐346/Rocca
In this paper, the security of Advanced Encryption Standard‐based authenticated encryption schemes, including AEGIS family, Tiaoxin‐346, and Rocca, is examined by mixed integer linear programing (MILP) tools. Specifically, for the initialisation phase of AEGIS, Tiaoxin‐346, and Rocca, the security against differential attacks and integral attacks is ...
Takuro Shiraya +3 more
wiley +1 more source
A preimage attack on reduced GIMLI‐HASH with unbalanced squeezing phase
Abstract In Conference on Cryptographic Hardware and Embedded System 2017, Bernstein et al. proposed GIMLI, a 384‐bit permutation with 24 rounds, which aims to provide high performance on various platforms. In 2019, the full‐round (24 rounds) GIMLI permutation was used as an underlying primitive for building AEAD GIMLI‐CIPHER and hash function GIMLI ...
Yongseong Lee +3 more
wiley +1 more source
Securing Topology Control in SDWSNs Using Identity‐Based Cryptography
In software‐defined wireless sensor networks (SDWSNs), topology control is a fundamental procedure to maintain the global network topology. However, the open wireless channels of SDWSNs make it possible for an attacker to eavesdrop, replay, or modify the topology messages, thus posing a great threat to the network operations.
Rui Wang +11 more
wiley +1 more source
Power Yoga: Variable-Stretch Security of CCM for Energy-Efficient Lightweight IoT
The currently ongoing NIST LWC project aims at identifying new standardization targets for lightweight authenticated encryption with associated data (AEAD) and (optionally) lightweight cryptographic hashing.
Emiljano Gjiriti +2 more
doaj +1 more source
ROLE OF MICROWAVE ENERGY TO CONTROL THREE SPECIES OF STORE PRODUCTS INSECTS [PDF]
Three levels of microwave energy low ,medium& ,high. 260,520 and 780 w, respectively were used to control three species of the saw-toothed grain beetle Oryzaephilus surinamensis L.,Red flour beetle Tribolium castaneum Herbst,the Khapra beetle Trogoderma ...
Aead Y. Ismail
doaj +1 more source
Subverting Decryption in AEAD [PDF]
This work introduces a new class of Algorithm Substitution Attack (ASA) on Symmetric Encryption Schemes. ASAs were introduced by Bellare, Paterson and Rogaway in light of revelations concerning mass surveillance. An ASA replaces an encryption scheme with a subverted version that aims to reveal information to an adversary engaged in mass surveillance ...
Marcel Armour, Bertram Poettering
openaire +1 more source
Efficient (Masked) Hardware Implementation of Grain‐128AEADv2
We consider the efficient hardware implementation of Grain‐128AEADv2, which is the second version of Grain‐128AEAD (one of the lightweight cryptography finalist candidates). In order to counteract side‐channel attacks, the efficient masked hardware implementation of Grain‐128AEADv2 is also considered under the idea of domain‐oriented masking. In detail,
Bohan Li +3 more
wiley +1 more source
Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G
In this paper, we present an AES-based authenticated-encryption with associated-data scheme called Rocca, with the purpose to reach the requirements on the speed and security in 6G systems. To achieve ultra-fast software implementations, the basic design
Kosei Sakamoto +4 more
doaj +1 more source

