Results 31 to 40 of about 437 (131)

New Approach towards Generalizing Feistel Networks and Its Provable Security

open access: yesSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
This paper proposes a new approach to generalizing Feistel networks, which unifies the classical (balanced) Feistel network and the Lai–Massey structure. We call the new structure extended Feistel (E‐Feistel) network. To justify its soundness, we investigate its indistinguishability using Patarin’s H‐coefficient technique.
Jiajie Liu   +3 more
wiley   +1 more source

Current Research Trends in IoT Security: A Systematic Mapping Study

open access: yesMobile Information Systems, Volume 2021, Issue 1, 2021., 2021
The smart mobile Internet‐of‐things (IoT) network lays the foundation of the fourth industrial revolution, the era of hyperconnectivity, hyperintelligence, and hyperconvergence. As this revolution gains momentum, the security of smart mobile IoT networks becomes an essential research topic.
Jee Young Lee   +2 more
wiley   +1 more source

A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]

open access: yes, 2018
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal   +2 more
core   +2 more sources

Impossible Differential Cryptanalysis of SIMECK32/64 Algorithm [PDF]

open access: yesJisuanji gongcheng, 2017
This paper studies the capability of impossible differential cryptanalysis on block cipher SIMECK32/64.The 11-round impossible differential path of SIMECK32/64 is constructed using the meet-in-the-middle technology.The attack on 19-round SIMECK32/64 is ...
CHEN Yanqin,ZHANG Wenying
doaj   +1 more source

A MAC Mode for Lightweight Block Ciphers [PDF]

open access: yes, 2016
status ...
A Baysal   +35 more
core   +3 more sources

Simulation, visualization and dosimetric validation of scatter radiation distribution under fluoroscopy settings [PDF]

open access: yes, 2015
2015-2016 > Academic research: refereed > Refereed conference paperVersion of ...
Chan, LWC   +4 more
core   +1 more source

Quantum All-Subkeys-Recovery Attacks on 6-round Feistel-2* Structure Based on Multi-Equations Quantum Claw Finding

open access: yes, 2023
Exploiting quantum mechanisms, quantum attacks have the potential ability to break the cipher structure. Recently, Ito et al. proposed a quantum attack on Feistel-2* structure (Ito et al.'s attack) based onthe Q2 model. However, it is not realistic since
Li, Zixian, Liu, Wenjie, Wang, Mengting
core   +1 more source

Rotational‐XOR Rectangle Cryptanalysis on Round‐Reduced Simon

open access: yesSecurity and Communication Networks, Volume 2020, Issue 1, 2020., 2020
Recently, Ashur and Liu introduced the Rotational-XOR-difference approach which is a modification of rotational cryptanalysis, for an ARX cipher Speck (Ashur and Liu, 2016). In this paper, we apply the Rotational‐XOR‐difference (RXD) approach to a non‐ARX cipher Simon and evaluate its security.
Bonwook Koo   +3 more
wiley   +1 more source

Hardware Implementation of Secure Lightweight Cryptographic Designs for IoT Applications

open access: yesSecurity and Communication Networks, Volume 2020, Issue 1, 2020., 2020
The recent expansion of the Internet of Things is creating a new world of smart devices in which security implications are very significant. Besides the claimed security level, the IoT devices are usually featured with constrained resources, such as low computation capability, low memory, and limited battery.
Wajih El Hadj Youssef   +4 more
wiley   +1 more source

Linear Cryptanalysis of Reduced-Round Simeck Using Super Rounds [PDF]

open access: yes, 2022
The Simeck family of lightweight block ciphers was proposed by Yang et al. in 2015, which combines the design features of the NSA-designed block ciphers Simon and Speck.
Poorvi Vora, Reham Almukhlifi
core  

Home - About - Disclaimer - Privacy