Results 41 to 50 of about 5,570 (256)
A comprehensive evaluation of the seven (out of 10) algorithm finalists of the NIST IoT lightweight cipher competition that do not integrate built‐in countermeasures is proposed. The study shows that, nonetheless, they still present some residual vulnerabilities to power SCA.
Aurelien T. Mozipo, John M. Acken
wiley +1 more source
Differential, Linear, and Meet‐in‐the‐Middle Attacks on the Lightweight Block Cipher RBFK
Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment. Although the authors claimed that RBFK is secure against differential cryptanalysis, linear cryptanalysis, impossible differential attack, and zero correlation linear ...
Sugio Nobuyuki, Qichun Wang
wiley +1 more source
ALICA: A Multi‐S‐Box Lightweight Cryptographic Algorithm Based on Generalized Feistel Structure
With the development of science and technology, IoT devices have already become ubiquitous in the public eye. Through the perception layer, the collected data are displayed or transmitted to the server backend for analysis. Due to the increasing integration of IoT devices into people’s daily lives, privacy issues, such as data leaks, have received more
Jun Ye +4 more
wiley +1 more source
New Results on Machine Learning-Based Distinguishers
Machine Learning (ML) is almost ubiquitously used in multiple disciplines nowadays. Recently, we have seen its usage in the realm of differential distinguishers for symmetric key ciphers. It has been shown that ML-based differential distinguishers can be
Anubhab Baksi +5 more
doaj +1 more source
[Retracted] A Comprehensive Review of Lightweight Authenticated Encryption for IoT Devices
Internet of Things (IoT) is a promising technology for creating smart environments, smart systems, and smart services. Since security is a fundamental requirement of IoT platforms, solutions that can provide both encryption and authenticity simultaneously have recently attracted much attention from academia and industry. This article analyses in detail
Zainab AlJabri +3 more
wiley +1 more source
Sycon: a new milestone in designing ASCON-like permutations [PDF]
ASCON is one of the elegant designs of authenticated encryption with associated data (AEAD) that was selected as the first choice for lightweight applications in the CAESAR competition, which also has been submitted to NIST lightweight cryptography standardization. ASCON has been in the literature for a while; however, there has been no successful AEAD
Mandal, Kalikinkar +3 more
openaire +1 more source
Variables that intervene in the weight of rotifer biomass and fatty acids
Abstract The biomass of rotifers is used as live food in aquaculture; their quality is determined by the content of the main polyunsaturated fatty acids and the weight it acquires over time. The objective of this work was to evaluate the variables involved in this process to achieve higher quality.
Carla Patricia Aguilar Samanamud +7 more
wiley +1 more source
Time to Upgrade: A New OpenSPIM Guide to Build and Operate Advanced OpenSPIM Configurations
New instructions and guides on how to assemble, configure, and align an X‐OpenSPIM, together with a completely overhauled software plugin (μOpenSPIM), make it easier and less time‐consuming for OpenSPIM users to upgrade to a more advanced OpenSPIM system and use it as a powerful research tool in their laboratories.
Johannes Girstmair +4 more
wiley +1 more source
AEGIS, an authenticated encryption (AE) algorithm designed by H. J. Wu and B. Preneel, is one of the six winners of the Competition for Authenticated Encryption: Security, Applicability, and Robustness, which was launched by the National Institute of Standards and Technology.
Tairong SHI +3 more
wiley +1 more source
Multiple Differential Distinguisher of SIMECK32/64 Based on Deep Learning
Currently, deep learning has provided an important means to solve problems in various fields. Intelligent computing will bring a new solution to the security analysis of lightweight block cipher as its analysis becomes more and more intelligent and automatic.
Huijiao Wang +5 more
wiley +1 more source

