Results 1 to 10 of about 53 (49)
Integral attack on HIGHT block cipher
The security of HIGHT block cipher under integral attack was studied. Firstly, the flaw in the existing results on building the distinguisher was corrected. And a new 11-round integral distinguisher of HIGHT was built.
Jian-sheng GUO +3 more
doaj +3 more sources
Secure HIGHT Implementation on ARM Processors
Secure and compact designs of HIGHT block cipher on representative ARM microcontrollers are presented in this paper. We present several optimizations for implementations of the HIGHT block cipher, which exploit different parallel approaches, including ...
Hwajeong Seo +7 more
doaj +1 more source
High-Speed Fault Attack Resistant Implementation of PIPO Block Cipher on ARM Cortex-A
In ICISC’20 conference, PIPO (Plug-In and Plug-Out) was proposed as an efficient block cipher for secure communication in IoT (Internet of Things) environment.
Jingyo Song +2 more
doaj +1 more source
Efficient Parallel Implementation of CTR Mode of ARX-Based Block Ciphers on ARMv8 Microcontrollers
With the advancement of 5G mobile telecommunication, various IoT (Internet of Things) devices communicate massive amounts of data by being connected to wireless networks.
JinGyo Song, Seog Chung Seo
doaj +1 more source
MILP‐based automatic differential search for LEA and HIGHT block ciphers [PDF]
The authors use the mixed‐integer linear programming (MILP) technique for the automatic search for differential characteristics of LEA and HIGHT ciphers. They show that the MILP model of the differential property of modular addition with one constant input can be represented with a much lesser number of linear inequalities compared
Elnaz Bagherzadeh, Zahra Ahmadian
openaire +1 more source
AVX512Crypto: Parallel Implementations of Korean Block Ciphers Using AVX-512
Cryptographic algorithms are widely used as the foundation of various security systems and applications (e.g., secure communication, blockchain systems, and cloud services).
Yongryeol Choi +2 more
doaj +1 more source
Parallel Implementations of ARX-Based Block Ciphers on Graphic Processing Units
With the development of information and communication technology, various types of Internet of Things (IoT) devices have widely been used for convenient services. Many users with their IoT devices request various services to servers.
SangWoo An +4 more
doaj +1 more source
Efficient Implementation of ARX-Based Block Ciphers on 8-Bit AVR Microcontrollers
As the development of Internet of Things (IoT), the data exchanged through the network has significantly increased. To secure the sensitive data with user’s personal information, it is necessary to encrypt the transmitted data. Since resource-constrained
YoungBeom Kim +4 more
doaj +1 more source
Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher [PDF]
HIGHT is a lightweight block cipher which has been adopted as a standard block cipher. In this paper, we present a bit-level algebraic fault analysis (AFA) of HIGHT, where the faults are perturbed by a stealthy HT. The fault model in our attack assumes that the adversary is able to insert a HT that flips a specific bit of a certain intermediate word of
Hao Chen +6 more
openaire +1 more source
Grover on Korean Block Ciphers
The Grover search algorithm reduces the security level of symmetric key cryptography with n-bit security level to O(2n/2). In order to evaluate the Grover search algorithm, the target block cipher should be efficiently implemented in quantum circuits ...
Kyoungbae Jang +5 more
doaj +1 more source

