Results 31 to 40 of about 437 (131)
New Approach towards Generalizing Feistel Networks and Its Provable Security
This paper proposes a new approach to generalizing Feistel networks, which unifies the classical (balanced) Feistel network and the Lai–Massey structure. We call the new structure extended Feistel (E‐Feistel) network. To justify its soundness, we investigate its indistinguishability using Patarin’s H‐coefficient technique.
Jiajie Liu +3 more
wiley +1 more source
Current Research Trends in IoT Security: A Systematic Mapping Study
The smart mobile Internet‐of‐things (IoT) network lays the foundation of the fourth industrial revolution, the era of hyperconnectivity, hyperintelligence, and hyperconvergence. As this revolution gains momentum, the security of smart mobile IoT networks becomes an essential research topic.
Jee Young Lee +2 more
wiley +1 more source
A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal +2 more
core +2 more sources
Impossible Differential Cryptanalysis of SIMECK32/64 Algorithm [PDF]
This paper studies the capability of impossible differential cryptanalysis on block cipher SIMECK32/64.The 11-round impossible differential path of SIMECK32/64 is constructed using the meet-in-the-middle technology.The attack on 19-round SIMECK32/64 is ...
CHEN Yanqin,ZHANG Wenying
doaj +1 more source
A MAC Mode for Lightweight Block Ciphers [PDF]
status ...
A Baysal +35 more
core +3 more sources
Simulation, visualization and dosimetric validation of scatter radiation distribution under fluoroscopy settings [PDF]
2015-2016 > Academic research: refereed > Refereed conference paperVersion of ...
Chan, LWC +4 more
core +1 more source
Exploiting quantum mechanisms, quantum attacks have the potential ability to break the cipher structure. Recently, Ito et al. proposed a quantum attack on Feistel-2* structure (Ito et al.'s attack) based onthe Q2 model. However, it is not realistic since
Li, Zixian, Liu, Wenjie, Wang, Mengting
core +1 more source
Rotational‐XOR Rectangle Cryptanalysis on Round‐Reduced Simon
Recently, Ashur and Liu introduced the Rotational-XOR-difference approach which is a modification of rotational cryptanalysis, for an ARX cipher Speck (Ashur and Liu, 2016). In this paper, we apply the Rotational‐XOR‐difference (RXD) approach to a non‐ARX cipher Simon and evaluate its security.
Bonwook Koo +3 more
wiley +1 more source
Hardware Implementation of Secure Lightweight Cryptographic Designs for IoT Applications
The recent expansion of the Internet of Things is creating a new world of smart devices in which security implications are very significant. Besides the claimed security level, the IoT devices are usually featured with constrained resources, such as low computation capability, low memory, and limited battery.
Wajih El Hadj Youssef +4 more
wiley +1 more source
Linear Cryptanalysis of Reduced-Round Simeck Using Super Rounds [PDF]
The Simeck family of lightweight block ciphers was proposed by Yang et al. in 2015, which combines the design features of the NSA-designed block ciphers Simon and Speck.
Poorvi Vora, Reham Almukhlifi
core

