Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms
In this article, we propose two new families of very lightweight and efficient authenticated encryption with associated data (AEAD) modes, Romulus and Remus, that provide security beyond the birthday bound with respect to the block-length n.
Tetsu Iwata +3 more
doaj +1 more source
Release of vasopressin from isolated permeabilized neurosecretory nerve terminals is blocked by the light chain of botulinum A toxin [PDF]
The intracellular action on exocytosis of botulinim A toxin and constituent chains was studied using permeabilized isolated nerve endings from the rat neural lobe. The release of the neuropeptide vasopressin was measured by radioimmunoassay.
Dayanithi, G. +4 more
core +6 more sources
Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation
This paper introduces Pyjamask, a new block cipher family and authenticated encryption proposal submitted to the NIST lightweight cryptography standardization process. Pyjamask targets side-channel resistance as one of its main goal.
Dahmun Goudarzi +6 more
doaj +1 more source
Low Trace-Count Template Attacks on 32-bit Implementations of ASCON AEAD
The recently adopted Ascon standard by NIST offers a lightweight authenticated encryption algorithm for use in resource-constrained cryptographic devices.
Shih-Chun You +3 more
doaj +1 more source
Balancing throughput and latency for an aerial robot over a wireless secure communication link [PDF]
With the requirement for remote control of unmanned aerial vehicles (UAV) becoming more frequent in scenarios where the environment is inaccessible or hazardous to human beings (e.g.
Adekunle, A.A. +3 more
core +1 more source
Quantum‐Resistant Security in Digital Twin Healthcare Systems
Quantum‐safe architecture for secure healthcare data transmission integrating QKD, edge devices, and cloud‐based Digital Twin analytics. ABSTRACT The development of digital twin (DT) systems for healthcare presents several challenges, particularly in ensuring data protection and communication security in real‐time environments.
Ahmed K. Jameil, Hamed Al‐Raweshidy
wiley +1 more source
Encryption Algorithm MLOL: Security and Efficiency Enhancement Based on the LOL Framework
Authenticated encryption with associated data (AEAD) schemes based on stream ciphers, such as ASCON and MORUS, typically use nonlinear feedback shift registers (NFSRs) and linear feedback shift registers (LFSRs) to generate variable-length key streams ...
Xinyue Zhang +3 more
doaj +1 more source
CoINS‐Parking: Compressed IoT Blockchain Network Smart Parking
In the proposed method, we first develop an IoT environment and then select Ethereum as its data storage platform. To build the blocks, data integrity, confidentiality, and short response time as the main requirements of the smart parking system are considered.
Danial Fazelpour, Athena Abdi
wiley +1 more source
Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers
The security of Internet of Things (IoT) devices relies on fundamental concepts such as cryptographically protected firmware updates. In this context attackers usually have physical access to a device and therefore side-channel attacks have to be ...
Florian Unterstein +5 more
doaj +1 more source
USED OF HOT AIR IN CONTROL RED FLOUR BEETLE Tribolium castaneum AND THE KHAPRA BEETLE Trogoderma granarium [PDF]
The effect of Hot air on the Killing a percentage of different stages of Red flour beetle Tribolium castaneum and The Khapra beetle Trogoderma granarium , have study: the larval stage of Khapra beetle is more resisting in expansion to Hot air in ...
Aead Haj Ismail +2 more
doaj +1 more source

