Results 51 to 60 of about 437 (131)

Security Analysis Techniques Using Differential Relationships For Block Ciphers [PDF]

open access: yes, 2018
The uses of block cipher has become crucial in nowadays’ computing era as well as the information security. Information must be available only for authenticated and authorized users.However,flaws and weaknesses in the cryptosystem can breach the security
Buja, Alya Geogiana
core  

Rotational-XOR Differential Rectangle Cryptanalysis on Simon-like Ciphers [PDF]

open access: yes, 2023
In this paper, we propose a rectangle-like method called \textit{rotational-XOR differential rectangle} attack to search for better distinguishers. It is a combination of the rotational-XOR cryptanalysis and differential cryptanalysis in the rectangle ...
Mingming Zhu   +5 more
core  

The Maiorana-McFarland structure based cryptanalysis of Simon [PDF]

open access: yes, 2022
In this paper we propose the linear hull construction for block ciphers with quadratic Maiorana-McFarland structure round functions. The search for linear trails with high squared correlations from our Maiorana-McFarland structure based constructive ...
Hao Chen
core  

Advanced Internet of Things and Big Data Technology for Smart Human‐Care Services

open access: yes, 2019
Journal of Sensors, Volume 2019, Issue 1, 2019.
Mucheol Kim, Ka Lok Man, Nurmamat Helil
wiley   +1 more source

Design and Cryptanalysis of Lightweight Symmetric Key Primitives [PDF]

open access: yes, 2020
The need for lightweight cryptographic primitives to replace the traditional standardized primitives such as AES, SHA-2 and SHA-3, which are unrealistic in constrained environments, has been anticipated by the cryptographic community for over a decade ...
Rohit, Raghvendra
core  

Efficient Implementation of Simeck Family Block Cipher on 8-Bit Processor

open access: yesJournal of information and communication convergence engineering, 2016
A lot of Internet of Things devices has resource-restricted environment, so it is difficult to implement the existing block ciphers such as AES, PRESENT. By this reason, there are lightweight block ciphers, such as SIMON, SPECK, and Simeck, support various block/key sizes. These lightweight block ciphers can support the security on the IoT devices.
Taehwan Park   +3 more
openaire   +2 more sources

Lightweight Cryptanalysis of IoT Encryption Algorithms: Is Quota Sampling the Answer?

open access: yesIEEE Access
Rapid growth in the number of small sensor devices known as the Internet of Things (IoT) has seen the development of lightweight encryption algorithms. Two well-known lightweight algorithms are SIMON and SIMECK which have been specifically designed for ...
Jonathan Cook   +2 more
doaj   +1 more source

The Security of SIMON-like Ciphers Against Linear Cryptanalysis [PDF]

open access: yes, 2017
In the present paper, we analyze the security of SIMON-like ciphers against linear cryptanalysis. First, an upper bound is derived on the squared correlation of SIMON-like round function.
Mingsheng Wang   +2 more
core  

The distinguishing attack on Speck, Simon, Simeck, HIGHT and LEA [PDF]

open access: yes, 2018
The purpose of the work is to estimate the resistance of lightweight block ciphers Speck, Simon, Simeck, HIGHT, LEA to a distinguishing attack. (This attack is a form of cryptanalysis on data encrypted by a cipher that allows an attacker to distinguish ...
Aleksandr Soskov, Boris Ryabko
core  

Multi-Purpose Designs in Lightweight Cryptography [PDF]

open access: yes, 2019
The purpose of this thesis is to explore a number of techniques used in lightweight cryptography design and their applications in the hardware designs of two lightweight permutations called sLiSCP and sLiSCP-light.
He, Morgan
core  

Home - About - Disclaimer - Privacy