Results 11 to 20 of about 2,414,614 (286)

Loong: A Family of Involutional Lightweight Block Cipher Based on SPN Structure

open access: yesIEEE Access, 2019
In past few years, as security ciphers in the Internet of Things (IoT), the research of lightweight block cipher has attracted tremendous attention in cryptography. The SPN structure has been widely used in the design of block cipher.
Bo-Tao Liu   +4 more
doaj   +2 more sources

SLIM: A Lightweight Block Cipher for Internet of Health Things [PDF]

open access: goldIEEE Access, 2020
Nowadays, there is a strong demand for increasing the protection of resource-constrained devices such as Radio frequency identification (RFID) systems. Current cryptographic algorithms are sufficient for high-resource desktop computers.
Bassam Aboushosha   +4 more
openalex   +2 more sources

Chaghri - A FHE-friendly Block Cipher

open access: yesConference on Computer and Communications Security, 2022
The Recent progress in practical applications of secure computation protocols has also attracted attention to the symmetric-key primitives underlying them.
T. Ashur, M. Mahzoun, Dilara Toprakhisar
semanticscholar   +1 more source

Secure Image Encryption Using Chaotic, Hybrid Chaotic and Block Cipher Approach

open access: yesJournal of Imaging, 2022
Secure image transmission is one of the most challenging problems in the age of communication technology. Millions of people use and transfer images for either personal or commercial purposes over the internet.
Nirmal Chaudhary   +2 more
semanticscholar   +1 more source

BipBip: A Low-Latency Tweakable Block Cipher with Small Dimensions

open access: yesIACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
Recently, a memory safety concept called Cryptographic Capability Computing (C3) has been proposed. C3 is the first memory safety mechanism that works without requiring extra storage for metadata and hence, has the potential to significantly enhance the ...
Yanis Belkheyar   +4 more
semanticscholar   +1 more source

Efficient Implementation of PRESENT and GIFT on Quantum Computers

open access: yesApplied Sciences, 2021
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key ...
Kyungbae Jang   +5 more
doaj   +1 more source

Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited

open access: yesIACR Transactions on Symmetric Cryptology, 2022
We construct non-malleable codes in the split-state model with codeword length m + 3λ or m + 5λ, where m is the message size and λ is the security parameter, depending on how conservative one is. Our scheme is very simple and involves a single call to a
Gianluca Brian   +3 more
doaj   +1 more source

Working Mode Recognition for SM4 Algorithm Based on Transformer [PDF]

open access: yesJisuanji gongcheng, 2023
Cipher algorithm recognition is a prerequisite for cryptanalysis and supervision of cryptographic equipment. Based on the summary and analyses of existing cipher algorithm recognition schemes, this study uses the K-Nearest Neighbor(KNN) algorithm and a ...
Yaping CHI, Ziyan YUE, Yuheng LIN
doaj   +1 more source

The SPEEDY Family of Block Ciphers - Engineering an Ultra Low-Latency Cipher from Gate Level for Secure Processor Architectures

open access: yesIACR Cryptology ePrint Archive, 2021
We introduce SPEEDY, a family of ultra low-latency block ciphers. We mix engineering expertise into each step of the cipher’s design process in order to create a secure encryption primitive with an extremely low latency in CMOS hardware.
G. Leander   +3 more
semanticscholar   +1 more source

Parallel Implementations of ARIA on ARM Processors and Graphics Processing Unit

open access: yesApplied Sciences, 2022
The ARIA block cipher algorithm is Korean standard, IETF standard (RFC 5794), and part of the TLS/SSL protocol. In this paper, we present the parallel implementation of ARIA block cipher on ARMv8 processors and GPU.
Siwoo Eum   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy