Security analysis of linearly filtered NLFSRs [PDF]
Non-linear feedback shift register (NLFSR) ciphers are cryptographic tools of choice of the industry especially for mobile communication. Their attractive feature is a high efficiency when implemented in hardware or software. However, the main problem of
Orumiehchiha Mohammad Ali +3 more
doaj +6 more sources
Using SAT Solvers to Finding Short Cycles in Cryptographic Algorithms [PDF]
A desirable property of iterated cryptographic algorithms, such as stream ciphers or pseudo-random generators, is the lack of short cycles. Many of the previously mentioned algorithms are based on the use of linear feedback shift registers (LFSR) and ...
Władysław Dudzic, Krzysztof Kanciak
doaj +7 more sources
Experimental FIA Methodology Using Clock and Control Signal Modifications under Power Supply and Temperature Variations [PDF]
The security of cryptocircuits is determined not only for their mathematical formulation, but for their physical implementation. The so-called fault injection attacks, where an attacker inserts faults during the operation of the cipher to obtain a ...
Francisco Eugenio Potestad-Ordóñez +4 more
doaj +2 more sources
Scalable Method of Searching for Full-period Nonlinear Feedback Shift Registers with GPGPU. New List of Maximum Period NLFSRs. [PDF]
This paper addresses the problem of efficient searchingfor Nonlinear Feedback Shift Registers (NLFSRs) with a guaranteed full period. The maximum possible period for an n-bit NLFSR is 2n1 (an all-zero state is omitted).
Paweł Augustynowicz, Krzysztof Kanciak
doaj +4 more sources
LWLCM: A novel lightweight stream cipher using logistic chaos function and multiplexer for IoT communications. [PDF]
The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment.
Shahnwaz Afzal +5 more
doaj +2 more sources
Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems [PDF]
Non-linear feedback shift registers are widely used in lightweight cryptographic primitives. For such constructions we propose a general analysis technique based on differential cryptanalysis. The essential idea is to identify conditions on the internal state to obtain a deterministic differential characteristic for a large number of rounds.
Simon Knellwolf +2 more
+4 more sources
DAPA: Differential Analysis aided Power Attack on (Non-) Linear Feedback Shift Registers
Differential power analysis (DPA) is a form of side-channel analysis (SCA) that performs statistical analysis on the power traces of cryptographic computations.
Siang Meng Sim +2 more
doaj +3 more sources
WAGE: An Authenticated Encryption with a Twist
This paper presents WAGE, a new lightweight sponge-based authenticated cipher whose underlying permutation is based on a 37-stage Galois NLFSR over F27.
Riham AlTawy +3 more
doaj +1 more source
Some properties of the cycle decomposition of WG-NLFSR
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Li, Yujuan +3 more
openaire +3 more sources
تحسين خوارزمية MD5 بالاعتماد على عدة طرق
المستخلص خوارزميات Hash هي الجزء المهم في العديد من تطبيقات التشفير والبروتوكولات الأمنية . هذا البحث يعمل على تعزيز خوارزميةMD5 ضد بعض الهجمات. التطوير الذي تم اعتماده في تحسين خوارزمية MD5 هو استخدام DNA coding ، والمعادلات الغير خطية (NLFSR ...
علاء فرحان +1 more
doaj +1 more source

