Results 21 to 30 of about 44,791 (329)

Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited

open access: yesIACR Transactions on Symmetric Cryptology, 2022
We construct non-malleable codes in the split-state model with codeword length m + 3λ or m + 5λ, where m is the message size and λ is the security parameter, depending on how conservative one is. Our scheme is very simple and involves a single call to a
Gianluca Brian   +3 more
doaj   +1 more source

Working Mode Recognition for SM4 Algorithm Based on Transformer [PDF]

open access: yesJisuanji gongcheng, 2023
Cipher algorithm recognition is a prerequisite for cryptanalysis and supervision of cryptographic equipment. Based on the summary and analyses of existing cipher algorithm recognition schemes, this study uses the K-Nearest Neighbor(KNN) algorithm and a ...
Yaping CHI, Ziyan YUE, Yuheng LIN
doaj   +1 more source

Parallel Implementations of ARIA on ARM Processors and Graphics Processing Unit

open access: yesApplied Sciences, 2022
The ARIA block cipher algorithm is Korean standard, IETF standard (RFC 5794), and part of the TLS/SSL protocol. In this paper, we present the parallel implementation of ARIA block cipher on ARMv8 processors and GPU.
Siwoo Eum   +5 more
doaj   +1 more source

How to distinguish between a block cipher and a random permutation by lowering the input entropy [PDF]

open access: yes, 2001
IEEE 35th International Carnahan Conference on Security Technology. Londres, 16-19 October 2001A novel cryptanalysis technique is presented, and its suitability for distinguishing a block cipher algorithm or a hash function from a random permutation is ...
González-Tablas, Ana Isabel   +3 more
core   +3 more sources

Block cipher four implementation on field programmable gate array

open access: yesCommunications in Science and Technology, 2020
Block ciphers are used to protect data in information systems from being leaked to unauthorized people. One of many block cipher algorithms developed by Indonesian researchers is the BCF (Block Cipher-Four) - a block cipher with 128-bit input/output that
Yusuf Kurniawan, Muhammad Adli Rizqulloh
doaj   +1 more source

A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]

open access: yes, 2018
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal   +2 more
core   +2 more sources

Cryptanalysis of a chaotic block cipher with external key and its improved version [PDF]

open access: yes, 2006
Recently, Pareek et al. proposed a symmetric key block cipher using multiple one-dimensional chaotic maps. This paper reports some new findings on the security problems of this kind of chaotic cipher: 1) a number of weak keys exists; 2) some important ...
Alvarez   +12 more
core   +2 more sources

New Constructions of MACs from (Tweakable) Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2017
We propose new constructions of Message Authentication Codes (MACs) from tweakable or conventional block ciphers. Our new schemes are either stateless and deterministic, nonce-based, or randomized, and provably secure either in the standard model for ...
Benoît Cogliati   +2 more
doaj   +1 more source

Counter Mode Development for Block Cipher Operations [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2009
There are two basic types of symmetric algorithms: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer.
Ali Sagheer
doaj   +1 more source

High-Speed Fault Attack Resistant Implementation of PIPO Block Cipher on ARM Cortex-A

open access: yesIEEE Access, 2021
In ICISC’20 conference, PIPO (Plug-In and Plug-Out) was proposed as an efficient block cipher for secure communication in IoT (Internet of Things) environment.
Jingyo Song   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy