Results 11 to 20 of about 556 (107)

Improved Conditional Differential Analysis on NLFSR‐Based Block Cipher KATAN32 with MILP [PDF]

open access: yesWireless Communications and Mobile Computing, Volume 2020, Issue 1, 2020., 2020
In this paper, a new method for constructing a Mixed Integer Linear Programming (MILP) model on conditional differential cryptanalysis of the nonlinear feedback shift register‐ (NLFSR‐) based block ciphers is proposed, and an approach to detecting the bit with a strongly biased difference is provided.
Zhaohui Xing   +3 more
wiley   +2 more sources

Residual vulnerabilities to power side channel attacks of lightweight ciphers cryptography competition finalists

open access: yesIET Computers &Digital Techniques, Volume 17, Issue 3-4, Page 75-88, May-July 2023., 2023
A comprehensive evaluation of the seven (out of 10) algorithm finalists of the NIST IoT lightweight cipher competition that do not integrate built‐in countermeasures is proposed. The study shows that, nonetheless, they still present some residual vulnerabilities to power SCA.
Aurelien T. Mozipo, John M. Acken
wiley   +1 more source

Conditional differential analysis on the KATAN ciphers based on deep learning

open access: yesIET Information Security, Volume 17, Issue 3, Page 347-359, May 2023., 2023
KATAN ciphers are block ciphers using non‐linear feedback shift registers. In this study, the authors improve the results of conditional differential analysis on KATAN by using deep learning. We present a practical key recovery attack on the 97‐round KATAN32 with 215.5 data complexity and 220.5 time complexity. The attack of the 82‐round KATAN48 and 70‐
Dongdong Lin   +3 more
wiley   +1 more source

Hardware implementation of a true random number generator integrating a hexagonal boron nitride memristor with a commercial microcontroller [PDF]

open access: yes, 2022
The development of the internet-of-things requires cheap, light, small and reliable true random number generator (TRNG) circuits to encrypt the data-generated by objects or humans-before transmitting them.
Aguirre F.   +12 more
core   +4 more sources

Improved Impossible Differentials and Zero‐Correlation Linear Hulls of New Structure III

open access: yesSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
Impossible differential cryptanalysis and zero‐correlation linear cryptanalysis are two kinds of most effective tools for evaluating the security of block ciphers. In those attacks, the core step is to construct a distinguisher as long as possible. In this paper, we focus on the security of New Structure III, which is a kind of block cipher structure ...
Jun He   +3 more
wiley   +1 more source

Development Of The Search Method For Non-linear Shift Registers Using Hardware, Implemented On Field Programmable Gate Arrays [PDF]

open access: yes, 2017
The nonlinear feedback shift registers of the second order inare considered, because based on them it can be developed a generator of stream ciphers with enhanced cryptographic strength.Feasibility of nonlinear feedback shift register search is analyzed.
Poluyanenko, N. (Nikolay)
core   +4 more sources

Impossible Differential Distinguishers of Two Generalized Feistel Structures

open access: yesSecurity and Communication Networks, Volume 2020, Issue 1, 2020., 2020
Generalized Feistel structures are widely used in the design of block ciphers. In this paper, we focused on retrieving impossible differentials for two kinds of generalized Feistel structures: CAST256‐like structure with Substitution‐Permutation (SP) or Substitution‐Permutation‐Substitution (SPS) round functions (named CAST256SP and CAST256SPS ...
Huili Wang   +5 more
wiley   +1 more source

Supersymmetry and Combinatorics [PDF]

open access: yes, 2006
We show how a recently proposed supersymmetric quantum mechanics model leads to non-trivial results/conjectures on the combinatorics of binary necklaces and linear-feedback shift-registers.
Onofri, E., Veneziano, G., Wosiek, J.
core   +3 more sources

Implementation of Direct Sequence Spread Spectrum Communication System Using FPGA [PDF]

open access: yes, 2017
This paper presents the designed and implementation of spread spectrum technology for data transfer to overcome the interference problems associated with narrow band, very high frequency and ultra high frequency data transfer systems. The spread spectrum
Karthick, N. (N)   +3 more
core   +1 more source

Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression [PDF]

open access: yes, 2015
International audienceIn typical applications of homomorphic encryption, the first step consists for Alice to encrypt some plaintext m under Bob’s public key pk and to send the ciphertext c = HEpk(m) to some third-party evaluator Charlie.
Canteaut, Anne   +6 more
core   +6 more sources

Home - About - Disclaimer - Privacy