Results 1 to 10 of about 53 (49)

Integral attack on HIGHT block cipher

open access: yesTongxin xuebao, 2016
The security of HIGHT block cipher under integral attack was studied. Firstly, the flaw in the existing results on building the distinguisher was corrected. And a new 11-round integral distinguisher of HIGHT was built.
Jian-sheng GUO   +3 more
doaj   +3 more sources

Secure HIGHT Implementation on ARM Processors

open access: yesMathematics, 2021
Secure and compact designs of HIGHT block cipher on representative ARM microcontrollers are presented in this paper. We present several optimizations for implementations of the HIGHT block cipher, which exploit different parallel approaches, including ...
Hwajeong Seo   +7 more
doaj   +1 more source

High-Speed Fault Attack Resistant Implementation of PIPO Block Cipher on ARM Cortex-A

open access: yesIEEE Access, 2021
In ICISC’20 conference, PIPO (Plug-In and Plug-Out) was proposed as an efficient block cipher for secure communication in IoT (Internet of Things) environment.
Jingyo Song   +2 more
doaj   +1 more source

Efficient Parallel Implementation of CTR Mode of ARX-Based Block Ciphers on ARMv8 Microcontrollers

open access: yesApplied Sciences, 2021
With the advancement of 5G mobile telecommunication, various IoT (Internet of Things) devices communicate massive amounts of data by being connected to wireless networks.
JinGyo Song, Seog Chung Seo
doaj   +1 more source

MILP‐based automatic differential search for LEA and HIGHT block ciphers [PDF]

open access: yesIET Information Security, 2020
The authors use the mixed‐integer linear programming (MILP) technique for the automatic search for differential characteristics of LEA and HIGHT ciphers. They show that the MILP model of the differential property of modular addition with one constant input can be represented with a much lesser number of linear inequalities compared
Elnaz Bagherzadeh, Zahra Ahmadian
openaire   +1 more source

AVX512Crypto: Parallel Implementations of Korean Block Ciphers Using AVX-512

open access: yesIEEE Access, 2023
Cryptographic algorithms are widely used as the foundation of various security systems and applications (e.g., secure communication, blockchain systems, and cloud services).
Yongryeol Choi   +2 more
doaj   +1 more source

Parallel Implementations of ARX-Based Block Ciphers on Graphic Processing Units

open access: yesMathematics, 2020
With the development of information and communication technology, various types of Internet of Things (IoT) devices have widely been used for convenient services. Many users with their IoT devices request various services to servers.
SangWoo An   +4 more
doaj   +1 more source

Efficient Implementation of ARX-Based Block Ciphers on 8-Bit AVR Microcontrollers

open access: yesMathematics, 2020
As the development of Internet of Things (IoT), the data exchanged through the network has significantly increased. To secure the sensitive data with user’s personal information, it is necessary to encrypt the transmitted data. Since resource-constrained
YoungBeom Kim   +4 more
doaj   +1 more source

Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher [PDF]

open access: yesSecurity and Communication Networks, 2017
HIGHT is a lightweight block cipher which has been adopted as a standard block cipher. In this paper, we present a bit-level algebraic fault analysis (AFA) of HIGHT, where the faults are perturbed by a stealthy HT. The fault model in our attack assumes that the adversary is able to insert a HT that flips a specific bit of a certain intermediate word of
Hao Chen   +6 more
openaire   +1 more source

Grover on Korean Block Ciphers

open access: yesApplied Sciences, 2020
The Grover search algorithm reduces the security level of symmetric key cryptography with n-bit security level to O(2n/2). In order to evaluate the Grover search algorithm, the target block cipher should be efficiently implemented in quantum circuits ...
Kyoungbae Jang   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy