Results 41 to 50 of about 437 (131)

Exploring Secret Keys in Searching Integral Distinguishers Based on Division Property

open access: yesIACR Transactions on Symmetric Cryptology, 2020
Division property proposed by Todo at EUROCRYPT 2015 is a generalized integral property. Then, conventional bit-based division property (CBDP) and bitbased division property using three subsets (BDPT) were proposed by Todo and Morii at FSE 2016.
Senpeng Wang   +4 more
doaj   +1 more source

Deep Features and Clustering Based Keyframes Selection with Security [PDF]

open access: yes, 2023
The digital world is developing more quickly than ever. Multimedia processing and distribution, however become vulnerable issues due to the enormous quantity and significance of vital information.
Chauhan, Prachi   +2 more
core   +1 more source

Differential analysis of lightweight cipher algorithm ACE based on MILP

open access: yesTongxin xuebao, 2023
The differential property of the lightweight cipher algorithm ACE was researched.n-dimension ring AND-gate combination was defined and its differential property was described accurately by only O(n) expressions with the MILP method by analyzing the ...
Shuai LIU, Jie GUAN, Bin HU, Sudong MA
doaj   +2 more sources

Optimal Differential Trails in SIMON-like Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2017
In the present paper, we propose an automatic search algorithm for optimal differential trails in SIMON-like ciphers. First, we give a more accurate upper bound on the differential probability of SIMON-like round function.
Zhengbin Liu   +2 more
doaj   +1 more source

Rotational-XOR Cryptanalysis of Simon-like Block Ciphers [PDF]

open access: yes, 2020
Rotational-XOR cryptanalysis is a cryptanalytic method aimed at finding distinguishable statistical properties in ARX-C ciphers, i.e., ciphers that can be described only using modular addition, cyclic rotation, XOR, and the injection of constants.
B Koo   +16 more
core   +1 more source

Fast implementations of ARX-based lightweight block ciphers (SPARX, CHAM) on 32-bit processor

open access: yesInternational Journal of Distributed Sensor Networks, 2019
Recently, many lightweight block ciphers are proposed, such as PRESENT, SIMON, SPECK, Simeck, SPARX, GIFT, and CHAM. Most of these ciphers are designed with Addition–Rotation–Xor (ARX)-based structure for the resource-constrained environment because ARX ...
Byoungjin Seok, Changhoon Lee
doaj   +1 more source

Improved Integral Attacks on SIMON32 and SIMON48 with Dynamic Key‐Guessing Techniques

open access: yesSecurity and Communication Networks, Volume 2018, Issue 1, 2018., 2018
Dynamic key‐guessing techniques, which exploit the property of AND operation, could improve the differential and linear cryptanalytic results by reducing the number of guessed subkey bits and lead to good cryptanalytic results for SIMON. They have only been applied in differential and linear attacks as far as we know.
Zhihui Chu   +5 more
wiley   +1 more source

Secure Data Encryption for Cloud‐Based Human Care Services

open access: yesJournal of Sensors, Volume 2018, Issue 1, 2018., 2018
Sensor network services utilize sensor data from low‐end IoT devices of the types widely deployed over long distances. After the collection of sensor data, the data is delivered to the cloud server, which processes it to extract useful information. Given that the data may contain sensitive and private information, it should be encrypted and exchanged ...
Taehwan Park   +4 more
wiley   +1 more source

Enabling low-latency IoT communication for resource-constrained devices with the led cipher and decipher protocol [PDF]

open access: yes
Block cipher algorithms are crucial for securing applications on resource-constrained devices. This paper introduces the modified light encryption device (MLED) cipher-decipher architecture, specifically designed to accommodate both 64-bit and 128-bit ...
Naik, Mahendra Shridhar   +2 more
core   +2 more sources

Symmetric block ciphers with a block length of 32 bit [PDF]

open access: yes, 2018
Subject of the thesis at hand is the analysis of symmetric block ciphers with a block length of 32 bit. It is meant to give a comprising overview over the topic of 32 bit block ciphers. The topic is divided in the examination of three questions.
Rothe, Stephan
core  

Home - About - Disclaimer - Privacy