Results 21 to 30 of about 1,458 (171)

The Area-Latency Symbiosis: Towards Improved Serial Encryption Circuits

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
The bit-sliding paper of Jean et al. (CHES 2017) showed that the smallest-size circuit for SPN based block ciphers such as AES, SKINNY and PRESENT can be achieved via bit-serial implementations.
Fatih Balli   +2 more
doaj   +3 more sources

Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms

open access: yesIACR Transactions on Symmetric Cryptology, 2020
In this article, we propose two new families of very lightweight and efficient authenticated encryption with associated data (AEAD) modes, Romulus and Remus, that provide security beyond the birthday bound with respect to the block-length n.
Tetsu Iwata   +3 more
doaj   +1 more source

Self-Synchronized Encryption for Physical Layer in Gigabit Ethernet Optical Links

open access: yesIEEE Access, 2020
In this work a new self-synchronized symmetric encryption solution for high speed communication systems necessary to preserve the format of the plaintext is proposed, developed and tested.
Adrian Perez-Resa   +3 more
doaj   +1 more source

Efficient Implementation of ARX-Based Block Ciphers on 8-Bit AVR Microcontrollers

open access: yesMathematics, 2020
As the development of Internet of Things (IoT), the data exchanged through the network has significantly increased. To secure the sensitive data with user’s personal information, it is necessary to encrypt the transmitted data. Since resource-constrained
YoungBeom Kim   +4 more
doaj   +1 more source

Highly Efficient Implementation of Block Ciphers on Graphic Processing Units for Massively Large Data

open access: yesApplied Sciences, 2020
With the advent of IoT and Cloud computing service technology, the size of user data to be managed and file data to be transmitted has been significantly increased.
SangWoo An, Seog Chung Seo
doaj   +1 more source

VERNAM CIPHER BASED METHOD OF PROTECTION FOR DATA TRANSFERRED BETWEEN UNMANNED AIRCRAFT AND GROUND CONTROL STATION [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2016
The paper deals with questions of protection against unauthorized access to the data transmitted between unmanned aircraft vehicle (UAV) and ground control station (GCS).
I. A. Avdonin, M. B. Budko, V. A. Grozov
doaj   +1 more source

1, 2, 3, Fork: Counter Mode Variants based on a Generalized Forkcipher

open access: yesIACR Transactions on Symmetric Cryptology, 2021
A multi-forkcipher (MFC) is a generalization of the forkcipher (FC) primitive introduced by Andreeva et al. at ASIACRYPT’19. An MFC is a tweakable cipher that computes s output blocks for a single input block, with s arbitrary but fixed.
Elena Andreeva   +3 more
doaj   +1 more source

A fundamental flaw in the ++AE authenticated encryption mode

open access: yesJournal of Mathematical Cryptology, 2018
In this article, we analyse a block cipher mode of operation for authenticated encryption known as ++AE (plus-plus-AE). We show that this mode has a fundamental flaw: the scheme does not verify the most significant bit of any block in the plaintext ...
Qahur Al Mahri Hassan   +4 more
doaj   +1 more source

AES-LBBB: AES Mode for Lightweight and BBB-Secure Authenticated Encryption

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
In this paper, a new lightweight authenticated encryption scheme AESLBBB is proposed, which was designed to provide backward compatibility with advanced encryption standard (AES) as well as high security and low memory.
Yusuke Naito   +2 more
doaj   +1 more source

Two New Lightweight Cryptographic Hash Functions Based on Saturnin and Beetle for the Internet of Things

open access: yesIEEE Access, 2023
With the enormous growth in Internet of Things (IoT) applications, the volume of data shared among IoT devices is vastly increasing. Extensive IoT device connectivity and substantial data transmission have made information integrity susceptible to ...
Susila Windarta   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy