Results 41 to 50 of about 2,410,295 (395)
CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks
Traditionally, countermeasures against physical attacks are integrated into the implementation of cryptographic primitives after the algorithms have been designed for achieving a certain level of cryptanalytic security.
Christof Beierle+3 more
semanticscholar +1 more source
A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal+2 more
core +2 more sources
Grover on Korean Block Ciphers [PDF]
The Grover search algorithm reduces the security level of symmetric key cryptography with n-bit security level to O(2n/2). In order to evaluate the Grover search algorithm, the target block cipher should be efficiently implemented in quantum circuits. Recently, many research works evaluated required quantum resources of AES block ciphers by optimizing ...
Kyoungbae Jang+5 more
openaire +2 more sources
Cryptanalysis of a chaotic block cipher with external key and its improved version [PDF]
Recently, Pareek et al. proposed a symmetric key block cipher using multiple one-dimensional chaotic maps. This paper reports some new findings on the security problems of this kind of chaotic cipher: 1) a number of weak keys exists; 2) some important ...
Alvarez+12 more
core +2 more sources
Quantitative Evaluation of Chaotic CBC Mode of Operation [PDF]
The cipher block chaining (CBC) block cipher mode of operation presents a very popular way of encrypting which is used in various applications. In previous research work, we have mathematically proven that, under some conditions, this mode of operation ...
Abidi, Abdessalem+4 more
core +3 more sources
Parallel Implementation of PIPO and Its Application for Format Preserving Encryption
The PIPO block cipher, a domestic lightweight block cipher, was announced at ICISC’20. In particular, the bitslicing technique is implemented in the S-Layer for the PIPO block cipher.
Hyunji Kim+5 more
doaj +1 more source
We introduce a new concept of elastic block ciphers, symmetric-key encryption algorithms that for a variable size input do not expand the plaintext, (i.e., do not require plaintext padding), while maintaining the diffusion property of traditional block ciphers and adjusting their computational load proportionally to the size increase.
Cook, Debra L.+2 more
openaire +2 more sources
In this paper, we propose a new symmetric key block cipher SC2000 with 128-bit block length and 128-,192-,256- bit key lengths. The block cipher is constructed by piling two layers: one is a Feistel structure layer and the other is an SPN structure layer. Each operation used in two layers is S-box or logical operation, which has been well studied about
Jun Yajima+7 more
openaire +1 more source
Comparison analysis of stream cipher algorithms for digital communication [PDF]
The broadcast nature of radio communication such as in the HF (High Frequency) spectrum exposes the transmitted information to unauthorized third parties. Confidentiality is ensured by employing cipher system.
Mat Sidek, Abd. Rahim+1 more
core +1 more source
Enhancing Embedded Data Security By Turns Cipher Block Chaining Mode Into Stream Cipher [PDF]
In this paper, a secure data hiding method is introduced. It increases the security of embedded data through combining between the steganography and cryptography. First, the secrete message is divided into blocks with same size according to length of key
Salah Mahdi Saleh
doaj +1 more source