Results 21 to 30 of about 3,394 (194)

KLEIN: A New Family of Lightweight Block Ciphers [PDF]

open access: yes, 2010
Resource-efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes.
A. Bogdanov   +39 more
core   +6 more sources

Tweaking Key-Alternating Feistel Block Ciphers [PDF]

open access: yes, 2020
Tweakable block cipher as a cryptographic primitive has found wide applications in disk encryption, authenticated encryption mode and message authentication code, etc. One popular approach of designing tweakable block ciphers is to tweak the generic constructions of classic block ciphers.
Hailun Yan   +3 more
openaire   +3 more sources

Full-round impossible differential attack on shadow block cipher

open access: yesCybersecurity, 2023
Lightweight block ciphers are the essential encryption algorithm for devices with limited resources. Its goal is to ensure the security of data transmission through resource-constrained devices.
Yuting Liu   +3 more
doaj   +1 more source

Dynamic Selection of Symmetric Key Cryptographic Algorithms for Securing Data Based on Various Parameters [PDF]

open access: yes, 2014
Most of the information is in the form of electronic data. A lot of electronic data exchanged takes place through computer applications. Therefore information exchange through these applications needs to be secure.
Abraham, Jibi   +7 more
core   +1 more source

Extended Generalized Feistel Networks using Matrix Representation [PDF]

open access: yes, 2013
International audienceWhile Generalized Feistel Networks have been widely studied in the literature as a building block of a block cipher, we propose in this paper a unified vision to easily represent them through a matrix representation. We then propose
A Biryukov   +23 more
core   +3 more sources

Elastic Block Ciphers: Method, Security and Instantiations [PDF]

open access: yes, 2009
We introduce the concept of an elastic block cipher which refers to stretching the supported block size of a block cipher to any length up to twice the original block size while incurring a computational workload that is proportional to the block size ...
Cook, Debra L.   +2 more
core   +3 more sources

KFC – The Krazy Feistel Cipher [PDF]

open access: yes, 2006
We introduce KFC, a block cipher based on a three round Feistel scheme. Each of the three round functions has an SPN-like structure for which we can either compute or bound the advantage of the best d-limited adaptive distinguisher, for any value of d.
Thomas Baignères, Matthieu Finiasz
openaire   +1 more source

Differential fault analysis about feistel block cipher [PDF]

open access: yesProceedings of the 2016 6th International Conference on Machinery, Materials, Environment, Biotechnology and Computer, 2016
Light-weight block cipher is the protection of RDIF label and smart card in communication of Internet of things.It's safty is very important..The article analyzes the fault propagation of the traditional light-weight block cipher with feistel structure and proposing a deep differential fault analysis straregy. The method based on half byte fault attack
Dong Li, Boliang Zhang
openaire   +1 more source

An Improvement of Serpent Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2005
An improvement to Serpent algorithm will be proposed . Serpent algorithm is a Feistel network , iterating a simple encryption function 32 times . The block size is 256 bits , and the key can be any length up to 256 bytes .
Saleh Al - Karaawy, Ashwaq Hashim
doaj   +1 more source

End-to-End Encryption in Resource-Constrained IoT Device

open access: yesIEEE Access, 2023
Internet of Things (IoT) technologies will interconnect with a wide range of network devices, regardless of their local network and resource capacities.
Ala Saleh D. Alluhaidan, P. Prabu
doaj   +1 more source

Home - About - Disclaimer - Privacy