Results 21 to 30 of about 437 (131)

Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-Guessing Techniques [PDF]

open access: yes, 2016
Simeck is a new family of lightweight block cipher proposed by Yang $$et\ al.$$ in CHES'15, which performs efficiently in hardware implementation. In this paper, we search out Simeck's differentials with low Hamming weight and high probability using Kolbl's tool, then exploit the links between differentials and linear characteristics to construct ...
Lingyue Qin, Huaifeng Chen, Xiaoyun Wang
core   +4 more sources

SIMECK-T: An Ultra-Lightweight Encryption Scheme for Resource-Constrained Devices

open access: yesApplied Sciences
The Internet of Things produces vast amounts of data that require specialized algorithms in order to secure them. Lightweight cryptography requires ciphers designed to work on resource-constrained devices like sensors and smart things.
Alin-Adrian Anton   +3 more
doaj   +2 more sources

sLiSCP: Simeck-Based Permutations for Lightweight Sponge Cryptographic Primitives [PDF]

open access: yes, 2017
In this paper, we propose a family of lightweight cryptographic permutations, named sLiSCP, with the sole aim to provide a realistic minimal design that suits a variety of lightweight device applications. More precisely, we argue that for such devices the area dedicated for security purposes should not only be consumed by an encryption or hashing ...
Riham AlTawy   +5 more
openaire   +3 more sources

Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs [PDF]

open access: yesIACR Transactions on Symmetric Cryptology
The impossible differential (ID) attack is one of the most important cryptanalytic techniques for block ciphers. There are two phases to finding an ID attack: searching for the distinguisher and building a key recovery upon it.
Debasmita Chakraborty   +3 more
doaj   +3 more sources

Design and cryptanalysis of a new iterative structure

open access: yesIET Information Security, Volume 17, Issue 3, Page 335-346, May 2023., 2023
We propose a new iterative structure called the L‐Feistel structure, which has a similar encryption with decryption. The L‐Feistel structure not only provides a unified view of the Feistel structure and the Lai–Massey structure but also enlarges the choices of structures for block cipher designs.
Jiajie Liu, Bing Sun, Chao Li
wiley   +1 more source

ALICA: A Multi‐S‐Box Lightweight Cryptographic Algorithm Based on Generalized Feistel Structure

open access: yesInternational Journal of Intelligent Systems, Volume 2023, Issue 1, 2023., 2023
With the development of science and technology, IoT devices have already become ubiquitous in the public eye. Through the perception layer, the collected data are displayed or transmitted to the server backend for analysis. Due to the increasing integration of IoT devices into people’s daily lives, privacy issues, such as data leaks, have received more
Jun Ye   +4 more
wiley   +1 more source

Characteristic automated search of cryptographic algorithms for distinguishing attacks (CASCADA)

open access: yesIET Information Security, Volume 16, Issue 6, Page 470-481, November 2022., 2022
Abstract Automated search methods based on Satisfiability Modulo Theory (SMT) problems are being widely used to evaluate the security of block ciphers against distinguishing attacks. While these methods provide a systematic and generic methodology, most of their software implementations are limited to a small set of ciphers and attacks, and extending ...
Adrián Ranea, Vincent Rijmen
wiley   +1 more source

Slide Attack on Full‐Round ULC Lightweight Block Cipher Designed for IoT

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
To meet the security demand for IoT devices, many new lightweight block ciphers are proposed. ULC is a lightweight block cipher designed for the IoT. It has many advantages in terms of memory use, efficiency, and security. In this paper, a slide attack on full‐round ULC is proposed in a related key setting.
Kai Zhang   +5 more
wiley   +1 more source

Multiple Differential Distinguisher of SIMECK32/64 Based on Deep Learning

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
Currently, deep learning has provided an important means to solve problems in various fields. Intelligent computing will bring a new solution to the security analysis of lightweight block cipher as its analysis becomes more and more intelligent and automatic.
Huijiao Wang   +5 more
wiley   +1 more source

An Efficient Lightweight Cryptographic Instructions Set Extension for IoT Device Security

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
The Internet of Things is changing all sectors such as manufacturing, agriculture, city infrastructure, and the automotive industry. All these applications ask for secure processors that can be embedded in the IoT devices. Furthermore, these devices are restricted in terms of computing capabilities, memory, and power consumption.
Wajih El Hadj Youssef   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy