Results 61 to 70 of about 437 (131)
Correlated Sequence Attack on Reduced-Round Simon-32/64 and Simeck-32/64 [PDF]
In this paper, we propose a novel cryptanalytic technique called correlated sequence attack on block ciphers. Our attack exploits the properties of given key dependent sequences of length $t$ to obtain other keyed sequences of same length with $\sigma$ ($
Guang Gong, Raghvendra Rohit
core
Optimized Hardware Implementations of Lightweight Cryptography [PDF]
Radio frequency identification (RFID) is a key technology for the Internet of Things era. One important advantage of RFID over barcodes is that line-of-sight is not required between readers and tags.
Yang, Gangqiang
core
A Flexible Ultralight Hardware Security Module for EPC RFID Tags [PDF]
Due to the rapid growth of using Internet of Things (IoT) devices in daily life, the need to achieve an acceptable level of security and privacy for these devices is rising.
Ayoub, Ahmed
core
Improved (Related-key) Differential-based Neural Distinguishers for SIMON and SIMECK Block Ciphers [PDF]
In CRYPTO 2019, Gohr made a pioneering attempt and successfully applied deep learning to the differential cryptanalysis against NSA block cipher Speck32/64, achieving higher accuracy than the pure differential distinguishers.
Bing Sun +4 more
core
Improved Fault Analysis on SIMECK Ciphers [PDF]
The advances of the Internet of Things (IoT) have had a fundamental impact and influence in sharping our rich living experiences. However, since IoT devices are usually resource-constrained, lightweight block ciphers have played a major role in serving ...
Ali A. Ghorbani +2 more
core
Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers [PDF]
Division property is a generalized integral property proposed by Todo at EUROCRYPT 2015, and very recently, Todo et al. proposed bit-based division property and applied to SIMON32 at FSE 2016.
A Biryukov +21 more
core +1 more source
Program for the May 5, 2023 University of Michigan Law School Senior ...
University of Michigan Law School
core +1 more source
Proposing an MILP-based Method for the Experimental Verification of Difference Trails [PDF]
Search for the right pairs of inputs in difference-based distinguishers is an important task for the experimental verification of the distinguishers in symmetric-key ciphers.
Nasour Bagheri +2 more
core
SECURITY ANALYSIS OF LIGHTWEIGHT CRYPTOGRAPHIC ALGORITHMS [PDF]
The paper examines three lightweight cryptographic algorithms - SKINNY, ForkAE, and Romulus. The research focuses on evaluating their security against various cryptographic attacks. Methods used: theoretical analysis and summary.
Dimitrov, Ivaylo, Dimitrova, Dilyana
core +3 more sources
Side Channel Analysis of SPECK Based on Transfer Learning. [PDF]
Zhang Q, Zhang H, Cui X, Fang X, Wang X.
europepmc +1 more source

