Results 41 to 49 of about 70 (49)
Electromagnetic Side-Channel Resilience against Lightweight Cryptography [PDF]
Side-channel attacks are an unpredictable risk factor in cryptography. Therefore, observations of leakages through physical parameters, i.e., power and electromagnetic (EM) radiation, etc., of digital devices are essential to minimise vulnerabilities ...
Gunathilake, Nilupulee A.
core +2 more sources
Cryptanalysis of Some Block Cipher Constructions [PDF]
When the public-key cryptography was introduced in the 1970s, symmetric-key cryptography was believed to soon become outdated. Nevertheless, we still heavily rely on symmetric-key primitives as they give high-speed performance.
Abdelkhalek, Ahmed
core
Pre-sieve, Partial-guess, and Accurate estimation: Full-round Related-key Impossible Boomerang Attack on ARADI [PDF]
The impossible boomerang attack is a very powerful attack, and the existing results show that it is more effective than the impossible differential attack in the related-key scenario.
Lin Jiao, Xichao Hu
core
Generalized Impossible Differential Attacks on Block Ciphers: Application to SKINNY and ForkSKINNY [PDF]
Impossible differential cryptanalysis is a crucial cryptanalytical method for symmetric ciphers. Given an impossible differential, the key recovery attack typically proceeds in two steps: generating pairs of data and then identifying wrong keys using the
Lei Hu +4 more
core
Optimizing Key Recovery in Impossible Cryptanalysis and Its Automated Tool [PDF]
Impossible differential (ID) cryptanalysis and impossible boomerang (IB) cryptanalysis are two methods of impossible cryptanalysis against block ciphers. Since the seminal work introduced by Boura et al.
Haoyang Wang, Jianing Zhang
core
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Exploiting the Leakage: Analysis of Some Authenticated Encryption Schemes
Lecture Notes in Computer Science, 2016Somitra Kumar Sanadhya, Donghoon Chang
exaly
ASIC and FPGA Comparative Study for IoT Lightweight Hardware Security Algorithms
Journal of Circuits, Systems and Computers, 2019Abdelrahman S Hussein, Hassan Mostafa
exaly

