Results 51 to 60 of about 437 (131)
Security Analysis Techniques Using Differential Relationships For Block Ciphers [PDF]
The uses of block cipher has become crucial in nowadays’ computing era as well as the information security. Information must be available only for authenticated and authorized users.However,flaws and weaknesses in the cryptosystem can breach the security
Buja, Alya Geogiana
core
Rotational-XOR Differential Rectangle Cryptanalysis on Simon-like Ciphers [PDF]
In this paper, we propose a rectangle-like method called \textit{rotational-XOR differential rectangle} attack to search for better distinguishers. It is a combination of the rotational-XOR cryptanalysis and differential cryptanalysis in the rectangle ...
Mingming Zhu +5 more
core
The Maiorana-McFarland structure based cryptanalysis of Simon [PDF]
In this paper we propose the linear hull construction for block ciphers with quadratic Maiorana-McFarland structure round functions. The search for linear trails with high squared correlations from our Maiorana-McFarland structure based constructive ...
Hao Chen
core
Advanced Internet of Things and Big Data Technology for Smart Human‐Care Services
Journal of Sensors, Volume 2019, Issue 1, 2019.
Mucheol Kim, Ka Lok Man, Nurmamat Helil
wiley +1 more source
Design and Cryptanalysis of Lightweight Symmetric Key Primitives [PDF]
The need for lightweight cryptographic primitives to replace the traditional standardized primitives such as AES, SHA-2 and SHA-3, which are unrealistic in constrained environments, has been anticipated by the cryptographic community for over a decade ...
Rohit, Raghvendra
core
Efficient Implementation of Simeck Family Block Cipher on 8-Bit Processor
A lot of Internet of Things devices has resource-restricted environment, so it is difficult to implement the existing block ciphers such as AES, PRESENT. By this reason, there are lightweight block ciphers, such as SIMON, SPECK, and Simeck, support various block/key sizes. These lightweight block ciphers can support the security on the IoT devices.
Taehwan Park +3 more
openaire +2 more sources
Lightweight Cryptanalysis of IoT Encryption Algorithms: Is Quota Sampling the Answer?
Rapid growth in the number of small sensor devices known as the Internet of Things (IoT) has seen the development of lightweight encryption algorithms. Two well-known lightweight algorithms are SIMON and SIMECK which have been specifically designed for ...
Jonathan Cook +2 more
doaj +1 more source
The Security of SIMON-like Ciphers Against Linear Cryptanalysis [PDF]
In the present paper, we analyze the security of SIMON-like ciphers against linear cryptanalysis. First, an upper bound is derived on the squared correlation of SIMON-like round function.
Mingsheng Wang +2 more
core
The distinguishing attack on Speck, Simon, Simeck, HIGHT and LEA [PDF]
The purpose of the work is to estimate the resistance of lightweight block ciphers Speck, Simon, Simeck, HIGHT, LEA to a distinguishing attack. (This attack is a form of cryptanalysis on data encrypted by a cipher that allows an attacker to distinguish ...
Aleksandr Soskov, Boris Ryabko
core
Multi-Purpose Designs in Lightweight Cryptography [PDF]
The purpose of this thesis is to explore a number of techniques used in lightweight cryptography design and their applications in the hardware designs of two lightweight permutations called sLiSCP and sLiSCP-light.
He, Morgan
core

