A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal +2 more
core +2 more sources
Iterative Block Ciphers from Tweakable Block Ciphers with Long Tweaks
We consider a problem of constructing a secure block cipher from a tweakable block cipher (TBC) with long tweaks. Given a TBC with n-bit blocks and Γn-bit tweaks for Γ ≥ 1, one of the constructions by Minematsu in DCC 2015 shows that a simple iteration ...
Ryota Nakamichi, Tetsu Iwata
doaj +1 more source
Parallel Implementation of PIPO and Its Application for Format Preserving Encryption
The PIPO block cipher, a domestic lightweight block cipher, was announced at ICISC’20. In particular, the bitslicing technique is implemented in the S-Layer for the PIPO block cipher.
Hyunji Kim +5 more
doaj +1 more source
Cryptanalysis of a chaotic block cipher with external key and its improved version [PDF]
Recently, Pareek et al. proposed a symmetric key block cipher using multiple one-dimensional chaotic maps. This paper reports some new findings on the security problems of this kind of chaotic cipher: 1) a number of weak keys exists; 2) some important ...
Alvarez +12 more
core +2 more sources
Enhancing Embedded Data Security By Turns Cipher Block Chaining Mode Into Stream Cipher [PDF]
In this paper, a secure data hiding method is introduced. It increases the security of embedded data through combining between the steganography and cryptography. First, the secrete message is divided into blocks with same size according to length of key
Salah Mahdi Saleh
doaj +1 more source
A New Type of Cipher: DICING_csb [PDF]
In this paper, we will propose a new type of cipher named DICING_csb, which is derived from our previous stream cipher DICING. It has applied a stream of subkey and an encryption form of block ciphers, so it may be viewed as a combinative of stream ...
Li, An-Ping
core +2 more sources
Preoperative Cytopenia in Patients Affected by High‐Risk Neuroblastoma: Just a Matter of Platelets?
ABSTRACT Background and Aims In patients affected by high‐risk neuroblastoma (HR‐NB), complete macroscopic resection (CMR) is associated with better outcomes. These patients are often cytopenic due to intensive induction regimens. The aim of the present study is to assess the impact of preoperative cytopenia on surgical outcome in patients with HR‐NB ...
Giorgio Persano +13 more
wiley +1 more source
Counter Mode of the Shannon Block Cipher Based on MPF Defined over a Non-Commuting Group
In this paper, we present a counter mode of a Shannon block cipher based on the matrix power function. We make use of the matrix power function to define a single round symmetric cipher.
Aleksejus Mihalkovich +2 more
doaj +1 more source
ABSTRACT Background Cyclophosphamide (CY) is associated with potentially fatal cardiotoxicity, yet no electrocardiographic indices have been established for early detection of CY‐induced cardiomyopathy. This study aimed to determine whether corrected QT interval (QTc) prolongation can predict early onset of CY‐related cardiac dysfunction in pediatric ...
Junpei Kawamura +5 more
wiley +1 more source
Pengembangan Modul Enkripsi dan Dekripsi pada Php dengan Modifikasi Metode Kriptografi Vigenere Cipher dan Cipher Block Chaining (Studi Kasus pada Geekybyte.com) [PDF]
Penggunaan fungsi hash pada pengamanan data atau informasi pada sebuah web site sudah tidak aman lagi, karena memiliki kelemahan berupa collision. Pengamanan yang dilakukan tidak tergantung pada kerahasiaan metode atau algortima yang digunakan, tetapi ...
Aribowo, E. (Eko) +1 more
core

