Results 11 to 20 of about 2,414,614 (286)
Loong: A Family of Involutional Lightweight Block Cipher Based on SPN Structure
In past few years, as security ciphers in the Internet of Things (IoT), the research of lightweight block cipher has attracted tremendous attention in cryptography. The SPN structure has been widely used in the design of block cipher.
Bo-Tao Liu +4 more
doaj +2 more sources
SLIM: A Lightweight Block Cipher for Internet of Health Things [PDF]
Nowadays, there is a strong demand for increasing the protection of resource-constrained devices such as Radio frequency identification (RFID) systems. Current cryptographic algorithms are sufficient for high-resource desktop computers.
Bassam Aboushosha +4 more
openalex +2 more sources
Chaghri - A FHE-friendly Block Cipher
The Recent progress in practical applications of secure computation protocols has also attracted attention to the symmetric-key primitives underlying them.
T. Ashur, M. Mahzoun, Dilara Toprakhisar
semanticscholar +1 more source
Secure Image Encryption Using Chaotic, Hybrid Chaotic and Block Cipher Approach
Secure image transmission is one of the most challenging problems in the age of communication technology. Millions of people use and transfer images for either personal or commercial purposes over the internet.
Nirmal Chaudhary +2 more
semanticscholar +1 more source
BipBip: A Low-Latency Tweakable Block Cipher with Small Dimensions
Recently, a memory safety concept called Cryptographic Capability Computing (C3) has been proposed. C3 is the first memory safety mechanism that works without requiring extra storage for metadata and hence, has the potential to significantly enhance the ...
Yanis Belkheyar +4 more
semanticscholar +1 more source
Efficient Implementation of PRESENT and GIFT on Quantum Computers
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key ...
Kyungbae Jang +5 more
doaj +1 more source
Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited
We construct non-malleable codes in the split-state model with codeword length m + 3λ or m + 5λ, where m is the message size and λ is the security parameter, depending on how conservative one is. Our scheme is very simple and involves a single call to a
Gianluca Brian +3 more
doaj +1 more source
Working Mode Recognition for SM4 Algorithm Based on Transformer [PDF]
Cipher algorithm recognition is a prerequisite for cryptanalysis and supervision of cryptographic equipment. Based on the summary and analyses of existing cipher algorithm recognition schemes, this study uses the K-Nearest Neighbor(KNN) algorithm and a ...
Yaping CHI, Ziyan YUE, Yuheng LIN
doaj +1 more source
We introduce SPEEDY, a family of ultra low-latency block ciphers. We mix engineering expertise into each step of the cipher’s design process in order to create a secure encryption primitive with an extremely low latency in CMOS hardware.
G. Leander +3 more
semanticscholar +1 more source
Parallel Implementations of ARIA on ARM Processors and Graphics Processing Unit
The ARIA block cipher algorithm is Korean standard, IETF standard (RFC 5794), and part of the TLS/SSL protocol. In this paper, we present the parallel implementation of ARIA block cipher on ARMv8 processors and GPU.
Siwoo Eum +5 more
doaj +1 more source

