Integration of BWT scrambling and data compression in an innovative system enhances protection and versatile management of sensor feeds (SEC). [PDF]
Begum MB, Kaliyaperumal K.
europepmc +1 more source
Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT [PDF]
In 1994, Langford and Hellman introduced differential-linear (DL) cryptanalysis, with the idea of decomposing the block cipher E into two parts, EU and EL, such that EU exhibits a high-probability differential trail, while EL has a high-correlation ...
Hosein Hadipour +2 more
core
Enhancing Syslog Message Security and Reliability over Unidirectional Fiber Optics. [PDF]
Anton AA +3 more
europepmc +1 more source
An efficient medical data encryption scheme using selective shuffling and inter-intra pixel diffusion IoT-enabled secure E-healthcare framework. [PDF]
Ravichandran D +5 more
europepmc +1 more source
Forgery Attack on LightMAC Hash Function Scheme using SIMECK 32/64 Lightweight Block Cipher
T A Darumaya, B H Susanti
openaire +1 more source
Побудова розпiзнавача для шифру Simeck на основi криптоаналiтичного методу обертань
openaire +1 more source
Linear Cryptanalysis of Reduced-Round SIMECK Variants [PDF]
SIMECK is a family of 3 lightweight block ciphers designed by Yangi¾?et al. They follow the framework used by Beaulieu et al. from the United States National Security Agency NSA to design SIMON and SPECK. A cipher in this family with K-bit key and N-bit block is called SIMECKNi¾?/i¾?K.
Nasour Bagheri
exaly +7 more sources
Improved fault analysis on SIMECK ciphers [PDF]
The advances of the Internet of Things (IoT) have had a fundamental impact and influence in sharping our rich living experiences. However, since IoT devices are usually resource-constrained, lightweight block ciphers have played a major role in serving as a building block for secure IoT protocols.
Duc-Phong Le, Rongxing Lu
exaly +3 more sources
Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK [PDF]
Under embargo until: 2022-07-08Searching for the right pairs of inputs in difference-based distinguishers is an important task for the experimental verification of the distinguishers in symmetric-key ciphers.
Sadegh Sadeghi +2 more
exaly +5 more sources
Related searches:
Lightweight architecture for fault detection in Simeck cryptographic algorithms on FPGA
International Journal of Information Technology (Singapore), 2023Parul Sahare
exaly +2 more sources

