Results 1 to 10 of about 556 (107)

Using SAT Solvers to Finding Short Cycles in Cryptographic Algorithms [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2020
A desirable property of iterated cryptographic algorithms, such as stream ciphers or pseudo-random generators, is the lack of short cycles. Many of the previously mentioned algorithms are based on the use of linear feedback shift registers (LFSR) and ...
Władysław Dudzic, Krzysztof Kanciak
doaj   +7 more sources

Experimental FIA Methodology Using Clock and Control Signal Modifications under Power Supply and Temperature Variations [PDF]

open access: yesSensors, 2021
The security of cryptocircuits is determined not only for their mathematical formulation, but for their physical implementation. The so-called fault injection attacks, where an attacker inserts faults during the operation of the cipher to obtain a ...
Francisco Eugenio Potestad-Ordóñez   +4 more
doaj   +2 more sources

Scalable Method of Searching for Full-period Nonlinear Feedback Shift Registers with GPGPU. New List of Maximum Period NLFSRs. [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2018
This paper addresses the problem of efficient searchingfor Nonlinear Feedback Shift Registers (NLFSRs) with a guaranteed full period. The maximum possible period for an n-bit NLFSR is 2n􀀀1 (an all-zero state is omitted).
Paweł Augustynowicz, Krzysztof Kanciak
doaj   +4 more sources

LWLCM: A novel lightweight stream cipher using logistic chaos function and multiplexer for IoT communications. [PDF]

open access: yesPLoS ONE
The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment.
Shahnwaz Afzal   +5 more
doaj   +2 more sources

Security analysis of linearly filtered NLFSRs [PDF]

open access: yesJournal of Mathematical Cryptology, 2013
Non-linear feedback shift register (NLFSR) ciphers are cryptographic tools of choice of the industry especially for mobile communication. Their attractive feature is a high efficiency when implemented in hardware or software. However, the main problem of
Orumiehchiha Mohammad Ali   +3 more
doaj   +3 more sources

New Family of Stream Ciphers as Physically Clone-Resistant VLSI-Structures

open access: yesCryptography, 2019
A concept for creating a large class of lightweight stream ciphers as Key Stream Generators KSGs is presented. The resulting class-size exceeds 2323 possible different KSGs.
Ayoub Mars, Wael Adi
doaj   +3 more sources

DAPA: Differential Analysis aided Power Attack on (Non-) Linear Feedback Shift Registers

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
Differential power analysis (DPA) is a form of side-channel analysis (SCA) that performs statistical analysis on the power traces of cryptographic computations.
Siang Meng Sim   +2 more
doaj   +3 more sources

WAGE: An Authenticated Encryption with a Twist

open access: yesIACR Transactions on Symmetric Cryptology, 2020
This paper presents WAGE, a new lightweight sponge-based authenticated cipher whose underlying permutation is based on a 37-stage Galois NLFSR over F27.
Riham AlTawy   +3 more
doaj   +1 more source

تحسين خوارزمية MD5 بالاعتماد على عدة طرق

open access: yesمجلة الغري للعلوم الاقتصادية والادارية, 2017
المستخلص خوارزميات Hash  هي الجزء المهم في العديد من تطبيقات التشفير والبروتوكولات الأمنية .  هذا البحث يعمل على تعزيز خوارزميةMD5  ضد بعض الهجمات. التطوير الذي تم اعتماده في تحسين خوارزمية MD5  هو  استخدام DNA coding ، والمعادلات الغير خطية (NLFSR ...
علاء فرحان   +1 more
doaj   +1 more source

On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis

open access: yesIACR Transactions on Symmetric Cryptology, 2020
This paper presents the first third-party security analysis of TinyJAMBU, which is one of 32 second-round candidates in NIST’s lightweight cryptography standardization process. TinyJAMBU adopts an NLFSR based keyed-permutation that computes only a single
Dhiman Saha   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy