Results 41 to 49 of about 70 (49)

Electromagnetic Side-Channel Resilience against Lightweight Cryptography [PDF]

open access: yes
Side-channel attacks are an unpredictable risk factor in cryptography. Therefore, observations of leakages through physical parameters, i.e., power and electromagnetic (EM) radiation, etc., of digital devices are essential to minimise vulnerabilities ...
Gunathilake, Nilupulee A.
core   +2 more sources

Cryptanalysis of Some Block Cipher Constructions [PDF]

open access: yes, 2017
When the public-key cryptography was introduced in the 1970s, symmetric-key cryptography was believed to soon become outdated. Nevertheless, we still heavily rely on symmetric-key primitives as they give high-speed performance.
Abdelkhalek, Ahmed
core  

Pre-sieve, Partial-guess, and Accurate estimation: Full-round Related-key Impossible Boomerang Attack on ARADI [PDF]

open access: yes
The impossible boomerang attack is a very powerful attack, and the existing results show that it is more effective than the impossible differential attack in the related-key scenario.
Lin Jiao, Xichao Hu
core  

Generalized Impossible Differential Attacks on Block Ciphers: Application to SKINNY and ForkSKINNY [PDF]

open access: yes
Impossible differential cryptanalysis is a crucial cryptanalytical method for symmetric ciphers. Given an impossible differential, the key recovery attack typically proceeds in two steps: generating pairs of data and then identifying wrong keys using the
Lei Hu   +4 more
core  

Optimizing Key Recovery in Impossible Cryptanalysis and Its Automated Tool [PDF]

open access: yes
Impossible differential (ID) cryptanalysis and impossible boomerang (IB) cryptanalysis are two methods of impossible cryptanalysis against block ciphers. Since the seminal work introduced by Boura et al.
Haoyang Wang, Jianing Zhang
core  
Some of the next articles are maybe not open access.

Related searches:

Exploiting the Leakage: Analysis of Some Authenticated Encryption Schemes

Lecture Notes in Computer Science, 2016
Somitra Kumar Sanadhya, Donghoon Chang
exaly  

ASIC and FPGA Comparative Study for IoT Lightweight Hardware Security Algorithms

Journal of Circuits, Systems and Computers, 2019
Abdelrahman S Hussein, Hassan Mostafa
exaly  

Home - About - Disclaimer - Privacy