Results 111 to 120 of about 437 (131)
Some of the next articles are maybe not open access.
Security analysis of SIMECK block cipher against related-key impossible differential
Information Processing Letters, 2019zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Sadegh Sadeghi, Nasour Bagheri
exaly +2 more sources
International Journal of Ad Hoc and Ubiquitous Computing, 2023
Kaluri Praveen Raja +3 more
exaly +2 more sources
Kaluri Praveen Raja +3 more
exaly +2 more sources
Five Important Attack in Round Function Using SIMECK Algorithm
2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2018Block cipher-based hash function is a hash function that is constructed by applying a block cipher algorithm on a scheme to form a hash algorithm. So that the strength of the block cipher-based hash function depends on the strength of a block cipher algorithm which is used.
openaire +1 more source
Multiple Rounds Aware Power Analysis Attack for a Lightweight Cipher SIMECK
2016 IEEE Second International Conference on Big Data Computing Service and Applications (BigDataService), 2016Information obtained through sensors and accumulated in wearable computers can be used as big data. To ensure the safety of this information, the security of wearable computers has become more important than ever before. However, the AES that has been widely used cannot be applied to wearable computers due to the size of the embedment area in those ...
Masaya Yoshikawa +2 more
openaire +1 more source
Lecture Notes in Computer Science, 2018
In CHES’15, Yang et al. proposed a family of lightweight block cipher SIMECK which combines the good designs of SIMON and SPECK. In this paper, we analysis the properties of the round function of SIMECK, and eliminate the repeated use of rotational independence judgment condition in Liu’s algorithm that proposed in FSE’17, constructing the partial ...
Mingjiang Huang, Liming Wang, Yan Zhang
exaly +2 more sources
In CHES’15, Yang et al. proposed a family of lightweight block cipher SIMECK which combines the good designs of SIMON and SPECK. In this paper, we analysis the properties of the round function of SIMECK, and eliminate the repeated use of rotational independence judgment condition in Liu’s algorithm that proposed in FSE’17, constructing the partial ...
Mingjiang Huang, Liming Wang, Yan Zhang
exaly +2 more sources
Side Channel Attack of Lightweight Block Cipher Simeck Based on Deep Learning
2019 IEEE 6th International Symposium on Electromagnetic Compatibility (ISEMC), 2019Simeck32/64 algorithm is a lightweight encryption algorithm have no replacement and substitution operation. Therefore, in this paper, under the condition that intermediate value information and plaintext ciphertext are unknown, only get electromagnetic leakage data of the copy of the equipment of, we use these data trained a deep learning model of to ...
Chenxi Wu +3 more
openaire +1 more source
Efficient Hardware Implementation of SIMECK Lightweight Block Cipher
International Journal of High Performance Systems Architecture, 2023Shweta Kumari +2 more
openaire +1 more source
Evaluation of TDM and ADM Construction Using SIMECK 32/64 based on Cryptographic Randomness Test
2020 International Conference on Data Science and Its Applications (ICoDSA), 2020This study aims to infer the cryptographic strength of double-block-length schemes Tandem Davies-Meyer (TDM) and Abreast Davies-Meyer (ADM) using SIMECK 32/64 with Cryptographic Randomness Test (CRT). CRT is a form of statistical randomness test that consists of SAC Test, Linear span Test, Collision Test, and Coverage Test which can be used to evaluate
Muhamad Abdul Fikri, Yeni Farida
openaire +1 more source
Hardware Implementation of Simeck Cipher as a Lightweight Hash Function
2019Internet of Things brings a galore of lightweight connected devices which triggered a need for befitting security mechanisms. A lightweight hash function is one of the major step taken to accomplish that requirement. In this paper, capabilities of Simeck cipher for implementing hash function are explored.
Prachin Bhoyar +2 more
openaire +1 more source
Improving the Deep-Learning-Based Differential Distinguisher and Applications to Simeck
2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD), 2022Lijun Lyu, Yi Tu, Yingjie Zhang
openaire +1 more source

